INFO: task kworker/1:0:23 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:83242400
r4:83242400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83242400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e5e40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe11000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8596278c r4:85962400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8596278c r4:830cc080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83242400 r8:830cc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:830cc080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830cc080 r8:80287e08 r7:df819d50 r6:830cc100 r5:83242400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf879fb0 to 0xdf879ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:830cb100
INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a68bd000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
INFO: task kworker/1:1:3097 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1 state:D stack:0 pid:3097 tgid:3097 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec991d84 r8:00000002 r7:60000113 r6:ec991d8c r5:83fa8000
r4:83fa8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83fa8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6a980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83fa8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebff1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8596538c r4:85965000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8596538c r4:847cd980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83fa8000 r8:847cd9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:847cd980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847cd980 r8:80287e08 r7:df92de60 r6:847cd900 r5:83fa8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec991fb0 to 0xec991ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8458d540
INFO: task kworker/1:1:3097 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a6bc2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
INFO: task kworker/1:6:3134 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:6 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9b5d84 r8:00000002 r7:60000013 r6:df9b5d8c r5:83988000
r4:83988000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83988000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e5580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83988000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebea9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85962f8c r4:85962c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85962f8c r4:847cde00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83988000 r8:847cde2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:847cde00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847cde00 r8:80287e08 r7:df971e60 r6:847cde80 r5:83988000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9b5fb0 to 0xdf9b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:846ea700
INFO: task kworker/1:6:3134 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a6f39000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
INFO: task kworker/1:7:3137 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:7 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:8398ec00
r4:8398ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8398ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855882c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8398ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac81000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85687f8c r4:85687c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85687f8c r4:847cdf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8398ec00 r8:847cdf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:847cdf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847cdf00 r8:80287e08 r7:df9b5e60 r6:847cd480 r5:8398ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa29fb0 to 0xdfa29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:846ea940
INFO: task kworker/1:7:3137 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a7305000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
INFO: task kworker/0:10:3141 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:10 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:841ed400
r4:841ed400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841ed400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531bd00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e01eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84787b8c r4:84787800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84787b8c r4:847cfd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841ed400 r8:847cfdac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847cfd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847cfd80 r8:80287e08 r7:df9c9e60 r6:847cfe00 r5:841ed400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa5dfb0 to 0xdfa5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84a6fa80
INFO: task kworker/0:10:3141 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a7a03000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
INFO: task kworker/0:12:3145 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:12 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:841ebc00
r4:841ebc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841ebc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330f80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff45000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84787f8c r4:84787c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84787f8c r4:847cff80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841ebc00 r8:847cffac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847cff80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847cff80 r8:80287e08 r7:dfa5de60 r6:847cf900 r5:841ebc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa75fb0 to 0xdfa75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84a6fc40
INFO: task kworker/0:12:3145 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a7ce4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
INFO: task kworker/0:13:3147 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:13 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:8398c800
r4:8398c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8398c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c9d80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8398c800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f578c r4:853f5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853f578c r4:847cf880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8398c800 r8:847cf8ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847cf880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847cf880 r8:80287e08 r7:dfa75e60 r6:847cdc80 r5:8398c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa91fb0 to 0xdfa91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84a6fdc0
INFO: task kworker/0:13:3147 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a7ce4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
INFO: task kworker/0:14:3150 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:14 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfaadd84 r8:00000002 r7:60000013 r6:dfaadd8c r5:84516000
r4:84516000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84516000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84516000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e015d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f478c r4:853f4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853f478c r4:847cf000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84516000 r8:847cf02c r7:82804d40 r6:dddced80 r5:dddceda0
r4:847cf000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847cf000 r8:80287e08 r7:dfa91e60 r6:847cd500 r5:84516000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaadfb0 to 0xdfaadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84a64840
INFO: task kworker/0:14:3150 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a8069000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
INFO: task kworker/0:15:3151 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:15 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:84510000
r4:84510000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84510000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672fc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84510000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e056f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856d938c r4:856d9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856d938c r4:840f1580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84510000 r8:840f15ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:840f1580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:840f1580 r8:80287e08 r7:dfa91e60 r6:847cd200 r5:84510000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfab1fb0 to 0xdfab1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84a64840
INFO: task kworker/0:15:3151 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a83b3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
INFO: task kworker/0:16:3152 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:16 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:84516c00
r4:84516c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84516c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3bc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84516c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa93000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f778c r4:853f7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853f778c r4:840f1500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84516c00 r8:840f152c r7:82804d40 r6:dddced80 r5:dddceda0
r4:840f1500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:840f1500 r8:80287e08 r7:dfab1e60 r6:847cd180 r5:84516c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfab9fb0 to 0xdfab9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845c53c0
INFO: task kworker/0:16:3152 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a861c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:17:3154 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:17 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:84513c00
r4:84513c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84513c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84513c00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa3d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85419b8c r4:85419800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85419b8c r4:833a4b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84513c00 r8:833a4b2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:833a4b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:833a4b00 r8:80287e08 r7:dfab1e60 r6:847cd400 r5:84513c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfac5fb0 to 0xdfac5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845ee040
INFO: task kworker/0:17:3154 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a8dee000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:18:3156 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:18 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:84511800
r4:84511800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84511800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577880
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84511800 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfab3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84b68b8c r4:84b68800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b68b8c r4:833a4a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84511800 r8:833a4aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:833a4a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:833a4a80 r8:80287e08 r7:dfab1e60 r6:847cd380 r5:84511800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaddfb0 to 0xdfaddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845ee180
INFO: task kworker/0:18:3156 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a9461000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:19:3158 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:19 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:84513000
r4:84513000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84513000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85606040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84513000 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855d278c r4:855d2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d278c r4:830b8480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84513000 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:830b8480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830b8480 r8:80287e08 r7:dfab1e60 r6:830dee00 r5:84513000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaedfb0 to 0xdfaedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845ee2c0
INFO: task kworker/0:19:3158 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a9461000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:20:3160 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:20 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfafdd84 r8:00000002 r7:60000013 r6:dfafdd8c r5:84515400
r4:84515400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84515400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654640
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84515400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffd9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855d3f8c r4:855d3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d3f8c r4:830b8400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84515400 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0
r4:830b8400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830b8400 r8:80287e08 r7:dfab1e60 r6:833be400 r5:84515400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfafdfb0 to 0xdfafdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845ee3c0
INFO: task kworker/0:20:3160 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a9578000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:8:3163 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:8 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:84514800
r4:84514800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84514800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8453d440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84514800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0135000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a478c r4:856a4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856a478c r4:833be100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84514800 r8:833be12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:833be100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:833be100 r8:80287e08 r7:df9b5e60 r6:83826180 r5:84514800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa81fb0 to 0xdfa81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8453d240
INFO: task kworker/1:8:3163 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a9991000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:21:3164 blocked for more than 450 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:21 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:84512400
r4:84512400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84512400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856482c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84512400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc55000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c738c r4:856c7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c738c r4:83aedb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84512400 r8:83aedbac r7:82804d40 r6:dddced80 r5:dddceda0
r4:83aedb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:83aedb80 r8:80287e08 r7:dfab1e60 r6:8492d680 r5:84512400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb09fb0 to 0xdfb09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845ee540
INFO: task kworker/0:21:3164 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: a9c8d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:22:3168 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:22 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:8416d400
r4:8416d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8416d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af9c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8416d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb441000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856da78c r4:856da400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856da78c r4:83aedb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8416d400 r8:83aedb2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:83aedb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:83aedb00 r8:80287e08 r7:dfab1e60 r6:843a3000 r5:8416d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb31fb0 to 0xdfb31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845eea40
INFO: task kworker/0:22:3168 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: aa1d0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:9:3169 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:9 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:83fb0c00
r4:83fb0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83fb0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e5f40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83fb0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85962b8c r4:85962800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85962b8c r4:84279000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83fb0c00 r8:8427902c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84279000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84279000 r8:80287e08 r7:df9b5e60 r6:84279080 r5:83fb0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb35fb0 to 0xdfb35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8453d700
INFO: task kworker/1:9:3169 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: aa1d0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:23:3171 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:23 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb45d84 r8:00000002 r7:60000113 r6:dfb45d8c r5:847a3000
r4:847a3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847a3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2b40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:847a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb59f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b6f8c r4:858b6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b6f8c r4:830cc400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847a3000 r8:830cc42c r7:82804d40 r6:dddced80 r5:dddceda0
r4:830cc400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830cc400 r8:80287e08 r7:dfb31e60 r6:84279100 r5:847a3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb45fb0 to 0xdfb45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845ee900
INFO: task kworker/0:23:3171 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: aa458000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:24:3172 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:24 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:847a1800
r4:847a1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847a1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587bb40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:847a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857fef8c r4:857fec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:857fef8c r4:830cc380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847a1800 r8:830cc3ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:830cc380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830cc380 r8:80287e08 r7:dfb45e60 r6:84279180 r5:847a1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb49fb0 to 0xdfb49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845eebc0
INFO: task kworker/0:24:3172 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ab25a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:25:3174 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:25 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:847a4800
r4:847a4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847a4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591c980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:847a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa81000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856dbb8c r4:856db800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856dbb8c r4:830cc300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847a4800 r8:830cc32c r7:82804d40 r6:dddced80 r5:dddceda0
r4:830cc300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830cc300 r8:80287e08 r7:dfb45e60 r6:84279200 r5:847a4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb51fb0 to 0xdfb51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845eea80
INFO: task kworker/0:25:3174 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ab50d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:26:3176 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:26 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:847a0000
r4:847a0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847a0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849eb540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:847a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfff9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b4b8c r4:858b4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b4b8c r4:830cc280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847a0000 r8:830cc2ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:830cc280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830cc280 r8:80287e08 r7:dfb45e60 r6:84279280 r5:847a0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb59fb0 to 0xdfb59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845eea80
INFO: task kworker/0:26:3176 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ab50d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:27:3178 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:27 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:847a3c00
r4:847a3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847a3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a37c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:847a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebad1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b5f8c r4:858b5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b5f8c r4:8439f600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847a3c00 r8:8439f62c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8439f600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8439f600 r8:80287e08 r7:dfb45e60 r6:84279300 r5:847a3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb65fb0 to 0xdfb65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845eef00
INFO: task kworker/0:27:3178 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: abb02000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:28:3180 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:28 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:847a5400
r4:847a5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847a5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846eaec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:847a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb84f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8597c38c r4:8597c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8597c38c r4:8439f580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847a5400 r8:8439f5ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8439f580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8439f580 r8:80287e08 r7:dfb45e60 r6:84279380 r5:847a5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb75fb0 to 0xdfb75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:846eae80
INFO: task kworker/0:28:3180 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: abf08000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:29:3182 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:29 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:847a2400
r4:847a2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847a2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845d9040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:847a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb71d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8597f38c r4:8597f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8597f38c r4:84584f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847a2400 r8:84584f2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84584f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84584f00 r8:80287e08 r7:dfb75e60 r6:84279400 r5:847a2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb81fb0 to 0xdfb81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845ee680
INFO: task kworker/0:29:3182 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ac2dc000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:30:3184 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:30 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:841eec00
r4:841eec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841eec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c0580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb911000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8597e78c r4:8597e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8597e78c r4:847b6000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841eec00 r8:847b602c r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6000 r8:80287e08 r7:dfb81e60 r6:847b6080 r5:841eec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb69fb0 to 0xdfb69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845d9080
INFO: task kworker/0:30:3184 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ac35a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:31:3186 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:31 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:83b26c00
r4:83b26c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b26c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845d9300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb779000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84b6bb8c r4:84b6b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b6bb8c r4:847b6180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b26c00 r8:847b61ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6180 r8:80287e08 r7:dfb81e60 r6:847b6200 r5:83b26c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb85fb0 to 0xdfb85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845d9080
INFO: task kworker/0:31:3186 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ac926000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:32:3189 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:32 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:838b6c00
r4:838b6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:838b6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84603740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:838b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f179000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ecb77000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8504038c r4:85040000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8504038c r4:847b6280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:838b6c00 r8:847b62ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6280 r8:80287e08 r7:dfb85e60 r6:847b6300 r5:838b6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb91fb0 to 0xdfb91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845d9340
INFO: task kworker/0:32:3189 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: acd13000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:33:3190 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:33 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:841dd400
r4:841dd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841dd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb93000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8505a38c r4:8505a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8505a38c r4:847b6380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841dd400 r8:847b63ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6380 r8:80287e08 r7:dfb91e60 r6:847b6400 r5:841dd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb9dfb0 to 0xdfb9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845d9540
INFO: task kworker/0:33:3190 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ad380000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:34:3193 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:34 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:841d6000
r4:841d6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841d6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497ff00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f2f3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed2f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85c2f78c r4:85c2f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85c2f78c r4:847b6480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841d6000 r8:847b64ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6480 r8:80287e08 r7:dfb91e60 r6:847b6500 r5:841d6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbb5fb0 to 0xdfbb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845d9640
INFO: task kworker/0:34:3193 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ad380000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:35:3195 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:35 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83a50000
r4:83a50000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83a50000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84603b80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83a50000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:859cd78c r4:859cd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:859cd78c r4:847b6580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a50000 r8:847b65ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6580 r8:80287e08 r7:dfbb5e60 r6:847b6600 r5:83a50000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa8dfb0 to 0xdfa8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845d9700
INFO: task kworker/0:35:3195 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: addda000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:36:3196 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:36 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:841de000
r4:841de000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841de000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845d9a80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841de000 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacd9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:859ceb8c r4:859ce800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:859ceb8c r4:847b6680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841de000 r8:847b66ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6680 r8:80287e08 r7:dfbb5e60 r6:847b6700 r5:841de000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbc9fb0 to 0xdfbc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845d9700
INFO: task kworker/0:36:3196 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ae409000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:37:3198 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:37 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfbd5d84 r8:00000002 r7:60000013 r6:dfbd5d8c r5:84752400
r4:84752400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84752400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85127cc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84752400 r7:00000000 r6:83018000 r5:00001000 r4:7f1db000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb83000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:859e6f8c r4:859e6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:859e6f8c r4:847b6780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84752400 r8:847b67ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6780 r8:80287e08 r7:dfbb5e60 r6:847b6800 r5:84752400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbd5fb0 to 0xdfbd5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845d96c0
INFO: task kworker/0:37:3198 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: aefac000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:11:3204 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:11 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:847a0c00
r4:847a0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847a0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b83e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:847a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebecb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8596338c r4:85963000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8596338c r4:84279580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847a0c00 r8:842795ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84279580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84279580 r8:80287e08 r7:dfba9e60 r6:84279600 r5:847a0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbf5fb0 to 0xdfbf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b0200
INFO: task kworker/1:11:3204 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: aefac000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:12:3206 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:12 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:84755400
r4:84755400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84755400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6a040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84755400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebf07000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8596378c r4:85963400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8596378c r4:84279680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84755400 r8:842796ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84279680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84279680 r8:80287e08 r7:dfba9e60 r6:847b6880 r5:84755400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc0dfb0 to 0xdfc0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b0200
INFO: task kworker/1:12:3206 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: af2cc000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:38:3207 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:38 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84756c00
r4:84756c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84756c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85936600
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84756c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbeb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85bc578c r4:85bc5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85bc578c r4:847b6900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84756c00 r8:847b692c r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6900 r8:80287e08 r7:dfbb5e60 r6:847b6980 r5:84756c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc1dfb0 to 0xdfc1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845d9cc0
INFO: task kworker/0:38:3207 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: af9d0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:13:3208 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:13 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84751800
r4:84751800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84751800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6a300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84751800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebf25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85963b8c r4:85963800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85963b8c r4:84279700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84751800 r8:8427972c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84279700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84279700 r8:80287e08 r7:dfba9e60 r6:847b6a00 r5:84751800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc21fb0 to 0xdfc21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b0440
INFO: task kworker/1:13:3208 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: afbd8000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:14:3210 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:14 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc31d84 r8:00000002 r7:60000013 r6:dfc31d8c r5:84754800
r4:84754800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84754800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6a540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84754800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebf5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8596438c r4:85964000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8596438c r4:84279780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84754800 r8:842797ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84279780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84279780 r8:80287e08 r7:dfba9e60 r6:847b6a80 r5:84754800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc31fb0 to 0xdfc31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b0580
INFO: task kworker/1:14:3210 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: aff82000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:15:3213 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:15 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc41d84 r8:00000002 r7:60000013 r6:dfc41d8c r5:84750000
r4:84750000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84750000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6a700
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84750000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebfa7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85964b8c r4:85964800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85964b8c r4:84279800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84750000 r8:8427982c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84279800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84279800 r8:80287e08 r7:dfba9e60 r6:847b6b00 r5:84750000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc41fb0 to 0xdfc41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b06c0
INFO: task kworker/1:15:3213 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b0104000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:39:3215 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:39 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84753000
r4:84753000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84753000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851106c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84753000 r7:00000000 r6:83018000 r5:00001000 r4:7f34f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed73b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85bc6f8c r4:85bc6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85bc6f8c r4:847b6b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84753000 r8:847b6bac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6b80 r8:80287e08 r7:dfbb5e60 r6:847b6c00 r5:84753000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc3dfb0 to 0xdfc3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b3480
INFO: task kworker/0:39:3215 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b0414000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:40:3218 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:40 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:83a56c00
r4:83a56c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83a56c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83a56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f359000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eca4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85bc7b8c r4:85bc7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85bc7b8c r4:847b6c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a56c00 r8:847b6cac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6c80 r8:80287e08 r7:dfc3de60 r6:847b6d00 r5:83a56c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc61fb0 to 0xdfc61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b36c0
INFO: task kworker/0:40:3218 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b0810000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:41:3220 blocked for more than 451 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:41 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc6dd84 r8:00000002 r7:60000113 r6:dfc6dd8c r5:83b39800
r4:83b39800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b39800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc6de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fb80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b39800 r7:00000000 r6:83018000 r5:00001000 r4:7f423000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ecb3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85c9878c r4:85c98400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85c9878c r4:847b6d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b39800 r8:847b6dac r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6d80 r8:80287e08 r7:dfc61e60 r6:847b6e00 r5:83b39800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc6dfb0 to 0xdfc6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b3940
INFO: task kworker/0:41:3220 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b0a05000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:42:3224 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:42 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:83b38c00
r4:83b38c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b38c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6d00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed20d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85c5ff8c r4:85c5fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85c5ff8c r4:847b6f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b38c00 r8:847b6f2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:847b6f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847b6f00 r8:80287e08 r7:dfc6de60 r6:847b6f80 r5:83b38c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc89fb0 to 0xdfc89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b3c80
INFO: task kworker/0:42:3224 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b0f61000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:43:3225 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:43 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc8dd84 r8:00000002 r7:60000113 r6:dfc8dd8c r5:83b3c800
r4:83b3c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b3c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845d98c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f43d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9a8000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85c9b38c r4:85c9b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85c9b38c r4:8455c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b3c800 r8:8455c02c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c000 r8:80287e08 r7:dfc6de60 r6:8455c080 r5:83b3c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc8dfb0 to 0xdfc8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b3c80
INFO: task kworker/0:43:3225 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b1234000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:44:3228 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:44 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df989d84 r8:00000002 r7:60000113 r6:df989d8c r5:83faa400
r4:83faa400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83faa400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df989e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d42500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83faa400 r7:00000000 r6:83018000 r5:00001000 r4:7f42d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec02f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85c9ab8c r4:85c9a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85c9ab8c r4:8455c100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83faa400 r8:8455c12c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c100 r8:80287e08 r7:dfc8de60 r6:84279900 r5:83faa400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf989fb0 to 0xdf989ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847b3600
INFO: task kworker/0:44:3228 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b1574000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:45:3230 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:45 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83236000
r4:83236000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83236000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b3fc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f42f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df97b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85c9af8c r4:85c9ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85c9af8c r4:8455c180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83236000 r8:8455c1ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c180 r8:80287e08 r7:df989e60 r6:84279980 r5:83236000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d9fb0 to 0xdf9d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845d9f80
INFO: task kworker/0:45:3230 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b19c1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:46:3231 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:46 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:8398d400
r4:8398d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8398d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d994c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8398d400 r7:00000000 r6:83018000 r5:00001000 r4:7f4e5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed60f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8465878c r4:84658400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8465878c r4:8455c200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8398d400 r8:8455c22c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c200 r8:80287e08 r7:df989e60 r6:84279a00 r5:8398d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9e1fb0 to 0xdf9e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845c56c0
INFO: task kworker/0:46:3231 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b1e57000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:47:3233 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:47 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:83b3b000
r4:83b3b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b3b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b3980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f429000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb811000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85c9a78c r4:85c9a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85c9a78c r4:8455c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b3b000 r8:8455c2ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c280 r8:80287e08 r7:df9e1e60 r6:8455c300 r5:83b3b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc79fb0 to 0xdfc79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84553000
INFO: task kworker/0:47:3233 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b2326000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:48:3235 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:48 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84750c00
r4:84750c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84750c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d66e40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84750c00 r7:00000000 r6:83018000 r5:00001000 r4:7f49f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ecced000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85c9bb8c r4:85c9b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85c9bb8c r4:8455c380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84750c00 r8:8455c3ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c380 r8:80287e08 r7:df9e1e60 r6:8455c400 r5:84750c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9f5fb0 to 0xdf9f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84553000
INFO: task kworker/0:48:3235 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b2326000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:50:3240 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:50 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:8325c800
r4:8325c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8325c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d600
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8325c800 r7:00000000 r6:83018000 r5:00001000 r4:7f49f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84658b8c r4:84658800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84658b8c r4:8455c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8325c800 r8:8455c5ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c580 r8:80287e08 r7:df9f9e60 r6:8455c600 r5:8325c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa25fb0 to 0xdfa25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84553340
INFO: task kworker/0:50:3240 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b29a0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:51:3241 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:51 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:8325ec00
r4:8325ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8325ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85216380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8325ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f541000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed23d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84658f8c r4:84658c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84658f8c r4:8455c680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8325ec00 r8:8455c6ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c680 r8:80287e08 r7:df9f9e60 r6:8455c700 r5:8325ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc09fb0 to 0xdfc09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845533c0
INFO: task kworker/0:51:3241 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b2b71000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:52:3244 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:52 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83b03c00
r4:83b03c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b03c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85210740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f587000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eccbb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ca938c r4:85ca9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ca938c r4:8455c780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b03c00 r8:8455c7ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c780 r8:80287e08 r7:df9f9e60 r6:8455c800 r5:83b03c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa65fb0 to 0xdfa65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845537c0
INFO: task kworker/0:52:3244 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b2b71000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:53:3245 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:53 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:83b01800
r4:83b01800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b01800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85322f80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b01800 r7:00000000 r6:83018000 r5:00001000 r4:7f547000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ecbf3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ca9f8c r4:85ca9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ca9f8c r4:8455c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b01800 r8:8455c8ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c880 r8:80287e08 r7:df9f9e60 r6:8455c900 r5:83b01800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa7dfb0 to 0xdfa7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845537c0
INFO: task kworker/0:53:3245 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b362e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:54:3249 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:54 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83348c00
r4:83348c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83348c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ffb40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83348c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5f9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ecb19000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cc3f8c r4:85cc3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85cc3f8c r4:8455c980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83348c00 r8:8455c9ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455c980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455c980 r8:80287e08 r7:df9f9e60 r6:84279a80 r5:83348c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa55fb0 to 0xdfa55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84553d80
INFO: task kworker/0:54:3249 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b362e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:55:3251 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:55 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:83336000
r4:83336000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83336000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a8340
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83336000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc57000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85de0f8c r4:85de0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85de0f8c r4:8455ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83336000 r8:8455ca2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8455ca00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8455ca00 r8:80287e08 r7:df9f9e60 r6:84279b00 r5:83336000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfabdfb0 to 0xdfabdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84553d80
INFO: task kworker/0:55:3251 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b3a21000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:425:4464 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:425 state:D stack:0 pid:4464 tgid:4464 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf25d84 r8:00000002 r7:60000113 r6:eaf25d8c r5:85383c00
r4:85383c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85383c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf25e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85383c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bfb8c r4:852bf800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bfb8c r4:8530ab80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85383c00 r8:8530abac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ab80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ab80 r8:80287e08 r7:eaf15e60 r6:8521a080 r5:85383c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf25fb0 to 0xeaf25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
INFO: task kworker/1:425:4464 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b3d0a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:250:4476 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:250 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf5dd84 r8:00000002 r7:60000113 r6:eaf5dd8c r5:85380c00
r4:85380c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85380c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf5de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85217040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85380c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf77000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527e78c r4:8527e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8527e78c r4:8521a580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85380c00 r8:8521a5ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8521a580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8521a580 r8:80287e08 r7:eaf51e60 r6:8521a600 r5:85380c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf5dfb0 to 0xeaf5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85217c40
INFO: task kworker/0:250:4476 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b3f3d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:251:4479 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:251 state:D stack:0 pid:4479 tgid:4479 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf69d84 r8:00000002 r7:60000113 r6:eaf69d8c r5:8534d400
r4:8534d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8534d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85217ec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8534d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf6b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527e38c r4:8527e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8527e38c r4:8521a680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8534d400 r8:8521a6ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8521a680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8521a680 r8:80287e08 r7:eaf5de60 r6:8521a700 r5:8534d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf69fb0 to 0xeaf69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85217cc0
INFO: task kworker/0:251:4479 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b3f3d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:252:4484 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:252 state:D stack:0 pid:4484 tgid:4484 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eacddd84 r8:00000002 r7:60000013 r6:eacddd8c r5:85350000
r4:85350000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85350000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85350000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa5f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527ef8c r4:8527ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8527ef8c r4:8521a780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85350000 r8:8521a7ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8521a780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8521a780 r8:80287e08 r7:eaf5de60 r6:8530ac80 r5:85350000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacddfb0 to 0xeacddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85213180
INFO: task kworker/0:252:4484 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b464f000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:253:4485 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:253 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadb5d84 r8:00000002 r7:60000113 r6:eadb5d8c r5:85351800
r4:85351800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85351800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85351800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb03000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527f38c r4:8527f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8527f38c r4:8521a800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85351800 r8:8521a82c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8521a800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8521a800 r8:80287e08 r7:eacdde60 r6:8530ad00 r5:85351800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadb5fb0 to 0xeadb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85213180
INFO: task kworker/0:253:4485 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b464f000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:254:4486 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:254 state:D stack:0 pid:4486 tgid:4486 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eade9d84 r8:00000002 r7:60000113 r6:eade9d8c r5:85353c00
r4:85353c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85353c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85353c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfde9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527f78c r4:8527f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8527f78c r4:8521a880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85353c00 r8:8521a8ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8521a880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8521a880 r8:80287e08 r7:eadb5e60 r6:8530ad80 r5:85353c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeade9fb0 to 0xeade9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85213180
INFO: task kworker/0:254:4486 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b4850000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:255:4487 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:255 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae5dd84 r8:00000002 r7:60000113 r6:eae5dd8c r5:85355400
r4:85355400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85355400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b3c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85355400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527fb8c r4:8527f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8527fb8c r4:8521a900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85355400 r8:8521a92c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8521a900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8521a900 r8:80287e08 r7:eade9e60 r6:8530ae00 r5:85355400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae5dfb0 to 0xeae5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85213180
INFO: task kworker/0:255:4487 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b4a75000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:256:4489 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:256 state:D stack:0 pid:4489 tgid:4489 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae71d84 r8:00000002 r7:60000113 r6:eae71d8c r5:85356000
r4:85356000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85356000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b5c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85356000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eace5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527ff8c r4:8527fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8527ff8c r4:8521a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85356000 r8:8521a9ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8521a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8521a980 r8:80287e08 r7:eae5de60 r6:8530ae80 r5:85356000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae71fb0 to 0xeae71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85213180
INFO: task kworker/0:256:4489 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b4e52000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:427:4490 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:427 state:D stack:0 pid:4490 tgid:4490 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:85353000
r4:85353000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85353000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85353000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff67000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bff8c r4:852bfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bff8c r4:8530af00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85353000 r8:8530af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530af00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530af00 r8:80287e08 r7:eaf25e60 r6:8530af80 r5:85353000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae85fb0 to 0xeae85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853149c0
INFO: task kworker/1:427:4490 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b515e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:428:4492 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:428 state:D stack:0 pid:4492 tgid:4492 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae4dd84 r8:00000002 r7:60000113 r6:eae4dd8c r5:85356c00
r4:85356c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85356c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8800
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85356c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0553000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b0b8c r4:853b0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b0b8c r4:8530a280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85356c00 r8:8530a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a280 r8:80287e08 r7:eae85e60 r6:851f7000 r5:85356c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae4dfb0 to 0xeae4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:851f8300
INFO: task kworker/1:428:4492 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b533e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:429:4494 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:429 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf75d84 r8:00000002 r7:60000013 r6:eaf75d8c r5:85354800
r4:85354800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85354800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85354800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0077000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b038c r4:853b0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b038c r4:851f7080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85354800 r8:851f70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7080 r8:80287e08 r7:eae4de60 r6:851f7100 r5:85354800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf75fb0 to 0xeaf75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:851f8440
INFO: task kworker/1:429:4494 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b5534000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:430:4497 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:430 state:D stack:0 pid:4497 tgid:4497 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaed5d84 r8:00000002 r7:60000013 r6:eaed5d8c r5:85352400
r4:85352400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85352400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85352400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00cf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b078c r4:853b0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b078c r4:851f7180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85352400 r8:851f71ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7180 r8:80287e08 r7:eae4de60 r6:851f7200 r5:85352400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed5fb0 to 0xeaed5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:851f8480
INFO: task kworker/1:430:4497 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b56c5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:431:4498 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:431 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf85d84 r8:00000002 r7:60000113 r6:eaf85d8c r5:85302400
r4:85302400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85302400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85302400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05a9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b0f8c r4:853b0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b0f8c r4:851f7280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85302400 r8:851f72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7280 r8:80287e08 r7:eae4de60 r6:851f7300 r5:85302400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf85fb0 to 0xeaf85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:851f8740
INFO: task kworker/1:431:4498 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b5b63000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:432:4501 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:432 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf89d84 r8:00000002 r7:60000113 r6:eaf89d8c r5:85358000
r4:85358000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85358000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d0c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85358000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0701000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b1f8c r4:853b1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b1f8c r4:851f7380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85358000 r8:851f73ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7380 r8:80287e08 r7:eaf85e60 r6:851f7400 r5:85358000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf89fb0 to 0xeaf89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:851f8780
INFO: task kworker/1:432:4501 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b5d3e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:433:4503 blocked for more than 452 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:433 state:D stack:0 pid:4503 tgid:4503 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:85359800
r4:85359800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85359800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8ac0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85359800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e063e000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b138c r4:853b1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b138c r4:851f7480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85359800 r8:851f74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7480 r8:80287e08 r7:eaf89e60 r6:851f7500 r5:85359800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf91fb0 to 0xeaf91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:851f8780
INFO: task kworker/1:433:4503 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b608e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:434:4504 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:434 state:D stack:0 pid:4504 tgid:4504 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf95d84 r8:00000002 r7:60000013 r6:eaf95d8c r5:8535a400
r4:8535a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8535a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8e40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8535a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0679000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b178c r4:853b1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b178c r4:851f7580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8535a400 r8:851f75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7580 r8:80287e08 r7:eaf89e60 r6:851f7600 r5:8535a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf95fb0 to 0xeaf95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:851f8b80
INFO: task kworker/1:434:4504 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b608e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:435:4506 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:435 state:D stack:0 pid:4506 tgid:4506 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf99d84 r8:00000002 r7:60000113 r6:eaf99d8c r5:85358c00
r4:85358c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85358c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8f00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85358c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b1b8c r4:853b1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b1b8c r4:851f7680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85358c00 r8:851f76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7680 r8:80287e08 r7:eaf89e60 r6:851f7700 r5:85358c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf99fb0 to 0xeaf99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:851f8d40
INFO: task kworker/1:435:4506 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b64e5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:436:4509 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:436 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafa5d84 r8:00000002 r7:60000113 r6:eafa5d8c r5:84792400
r4:84792400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84792400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d600
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84792400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0819000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b2b8c r4:853b2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b2b8c r4:851f7780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84792400 r8:851f77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7780 r8:80287e08 r7:eaf89e60 r6:8521aa00 r5:84792400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa5fb0 to 0xeafa5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520d280
INFO: task kworker/1:436:4509 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b67b2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:437:4511 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:437 state:D stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafa9d84 r8:00000002 r7:60000113 r6:eafa9d8c r5:84790000
r4:84790000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84790000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84790000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0789000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b238c r4:853b2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b238c r4:851f7800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84790000 r8:851f782c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7800 r8:80287e08 r7:eafa5e60 r6:8521aa80 r5:84790000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa9fb0 to 0xeafa9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520d180
INFO: task kworker/1:437:4511 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b67b2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:438:4513 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:438 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafadd84 r8:00000002 r7:60000113 r6:eafadd8c r5:84793000
r4:84793000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84793000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84793000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e07e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b278c r4:853b2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b278c r4:851f7880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84793000 r8:851f78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7880 r8:80287e08 r7:eafa5e60 r6:8521ab00 r5:84793000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafadfb0 to 0xeafadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520d200
INFO: task kworker/1:438:4513 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b6b24000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:439:4515 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:439 state:D stack:0 pid:4515 tgid:4515 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafb5d84 r8:00000002 r7:60000113 r6:eafb5d8c r5:84794800
r4:84794800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84794800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d840
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84794800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e093f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b338c r4:853b3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b338c r4:851f7900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84794800 r8:851f792c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7900 r8:80287e08 r7:eafa5e60 r6:8521ab80 r5:84794800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb5fb0 to 0xeafb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520d3c0
INFO: task kworker/1:439:4515 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b6d7a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:440:4516 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:440 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:84795400
r4:84795400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84795400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d700
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84795400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0845000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b2f8c r4:853b2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b2f8c r4:851f7980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84795400 r8:851f79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7980 r8:80287e08 r7:eafb5e60 r6:8521ac00 r5:84795400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb9fb0 to 0xeafb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520d3c0
INFO: task kworker/1:440:4516 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b6fc1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:441:4519 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:441 state:D stack:0 pid:4519 tgid:4519 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafc9d84 r8:00000002 r7:60000013 r6:eafc9d8c r5:84793c00
r4:84793c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84793c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d9c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84793c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e49f1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b378c r4:853b3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b378c r4:851f7a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84793c00 r8:851f7a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7a00 r8:80287e08 r7:eafb5e60 r6:8521ac80 r5:84793c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc9fb0 to 0xeafc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520d500
INFO: task kworker/1:441:4519 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b73b3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:442:4521 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:442 state:D stack:0 pid:4521 tgid:4521 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:84796000
r4:84796000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84796000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520db40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84796000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabf9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b3b8c r4:853b3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b3b8c r4:851f7a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84796000 r8:851f7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7a80 r8:80287e08 r7:eafc9e60 r6:8521ad00 r5:84796000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafcdfb0 to 0xeafcdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520d7c0
INFO: task kworker/1:442:4521 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b776c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:443:4522 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:443 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:84796c00
r4:84796c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84796c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84796c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae39000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b9f8c r4:853b9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b9f8c r4:851f7b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84796c00 r8:851f7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7b00 r8:80287e08 r7:eafcde60 r6:8521ad80 r5:84796c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafd1fb0 to 0xeafd1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520d7c0
INFO: task kworker/1:443:4522 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b776c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:444:4524 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:444 state:D stack:0 pid:4524 tgid:4524 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafd9d84 r8:00000002 r7:60000113 r6:eafd9d8c r5:84790c00
r4:84790c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84790c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520dc40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84790c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b3f8c r4:853b3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b3f8c r4:851f7b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84790c00 r8:851f7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7b80 r8:80287e08 r7:eafd1e60 r6:8521ae00 r5:84790c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafd9fb0 to 0xeafd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520d940
INFO: task kworker/1:444:4524 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b776c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:445:4526 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:445 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:85388c00
r4:85388c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85388c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520dd80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85388c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac45000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b838c r4:853b8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b838c r4:851f7c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85388c00 r8:851f7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7c00 r8:80287e08 r7:eafd1e60 r6:8521ae80 r5:85388c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe1fb0 to 0xeafe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520da80
INFO: task kworker/1:445:4526 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b7da2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:446:4528 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:446 state:D stack:0 pid:4528 tgid:4528 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:85388000
r4:85388000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85388000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520dec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85388000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b878c r4:853b8400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b878c r4:851f7c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85388000 r8:851f7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7c80 r8:80287e08 r7:eafd1e60 r6:8521af00 r5:85388000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe9fb0 to 0xeafe9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520dc00
INFO: task kworker/1:446:4528 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b7da2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:447:4530 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:447 state:D stack:0 pid:4530 tgid:4530 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:85389800
r4:85389800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85389800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85389800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac7f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b8b8c r4:853b8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b8b8c r4:851f7d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85389800 r8:851f7d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7d00 r8:80287e08 r7:eafd1e60 r6:8521af80 r5:85389800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaff1fb0 to 0xeaff1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520de80
INFO: task kworker/1:447:4530 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b7da2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:448:4532 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:448 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaff5d84 r8:00000002 r7:60000113 r6:eaff5d8c r5:8538b000
r4:8538b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8538b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8538b000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadb9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b938c r4:853b9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b938c r4:851f7d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8538b000 r8:851f7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7d80 r8:80287e08 r7:eafd1e60 r6:8531e000 r5:8538b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaff5fb0 to 0xeaff5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8520de80
INFO: task kworker/1:448:4532 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b7da2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:257:4534 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:257 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:8538bc00
r4:8538bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8538bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8a40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8538bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaccd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b8f8c r4:853b8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853b8f8c r4:8531e080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8538bc00 r8:8531e0ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8531e080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531e080 r8:80287e08 r7:eae71e60 r6:8531e100 r5:8538bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc1fb0 to 0xeafc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8531b240
INFO: task kworker/0:257:4534 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b87b1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:258:4535 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:258 state:D stack:0 pid:4535 tgid:4535 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafe5d84 r8:00000002 r7:60000113 r6:eafe5d8c r5:8538c800
r4:8538c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8538c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1640
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8538c800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e091b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f4f8c r4:853f4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853f4f8c r4:8531e180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8538c800 r8:8531e1ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8531e180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531e180 r8:80287e08 r7:eae71e60 r6:8531e200 r5:8538c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe5fb0 to 0xeafe5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8531b240
INFO: task kworker/0:258:4535 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b89c4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:259:4538 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:259 state:D stack:0 pid:4538 tgid:4538 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf9dd84 r8:00000002 r7:60000113 r6:eaf9dd8c r5:8538d400
r4:8538d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8538d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8538d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0520000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bbf8c r4:853bbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853bbf8c r4:8531e280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8538d400 r8:8531e2ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8531e280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531e280 r8:80287e08 r7:eafe5e60 r6:8531e300 r5:8538d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf9dfb0 to 0xeaf9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8531b440
INFO: task kworker/0:259:4538 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b8bdf000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:449:4541 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:449 state:D stack:0 pid:4541 tgid:4541 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:8538e000
r4:8538e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8538e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8538e000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadd9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b978c r4:853b9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b978c r4:851f7e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8538e000 r8:851f7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7e00 r8:80287e08 r7:eafd1e60 r6:8531e380 r5:8538e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaffdfb0 to 0xeaffdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310180
INFO: task kworker/1:449:4541 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b8e24000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:450:4542 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:450 state:D stack:0 pid:4542 tgid:4542 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb001d84 r8:00000002 r7:60000013 r6:eb001d8c r5:8538ec00
r4:8538ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8538ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853104c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8538ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadf9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b9b8c r4:853b9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b9b8c r4:851f7e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8538ec00 r8:851f7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7e80 r8:80287e08 r7:eafd1e60 r6:8531e400 r5:8538ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb001fb0 to 0xeb001ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310180
INFO: task kworker/1:450:4542 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b8f67000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:451:4545 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:451 state:D stack:0 pid:4545 tgid:4545 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadadd84 r8:00000002 r7:60000113 r6:eadadd8c r5:85390000
r4:85390000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85390000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85390000 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853ba38c r4:853ba000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ba38c r4:851f7f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85390000 r8:851f7f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7f00 r8:80287e08 r7:eafd1e60 r6:8531e480 r5:85390000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadadfb0 to 0xeadadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310400
INFO: task kworker/1:451:4545 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b91b7000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:452:4548 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:452 state:D stack:0 pid:4548 tgid:4548 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaee5d84 r8:00000002 r7:60000113 r6:eaee5d8c r5:85392400
r4:85392400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85392400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853107c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85392400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853ba78c r4:853ba400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ba78c r4:851f7f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85392400 r8:851f7fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:851f7f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:851f7f80 r8:80287e08 r7:eadade60 r6:8531e500 r5:85392400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaee5fb0 to 0xeaee5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310480
INFO: task kworker/1:452:4548 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b9309000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:453:4549 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:453 state:D stack:0 pid:4549 tgid:4549 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:85393000
r4:85393000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85393000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310900
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85393000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdf3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bab8c r4:853ba800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bab8c r4:8531a000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85393000 r8:8531a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531a000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531a000 r8:80287e08 r7:eaee5e60 r6:8531e580 r5:85393000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaef1fb0 to 0xeaef1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310480
INFO: task kworker/1:453:4549 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b9470000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:454:4552 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:454 state:D stack:0 pid:4552 tgid:4552 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf11d84 r8:00000002 r7:60000013 r6:eaf11d8c r5:85391800
r4:85391800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85391800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310a40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85391800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe9d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853baf8c r4:853bac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853baf8c r4:8531a080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85391800 r8:8531a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531a080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531a080 r8:80287e08 r7:eaef1e60 r6:8531e600 r5:85391800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf11fb0 to 0xeaf11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310740
INFO: task kworker/1:454:4552 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b9870000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:455:4553 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:455 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf1dd84 r8:00000002 r7:60000113 r6:eaf1dd8c r5:85394800
r4:85394800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85394800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf1de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310b80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85394800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00f9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bb38c r4:853bb000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bb38c r4:8531a100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85394800 r8:8531a12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531a100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531a100 r8:80287e08 r7:eaf11e60 r6:8531e680 r5:85394800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf1dfb0 to 0xeaf1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310740
INFO: task kworker/1:455:4553 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b9ab9000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:456:4555 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:456 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaff9d84 r8:00000002 r7:60000113 r6:eaff9d8c r5:8535c800
r4:8535c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8535c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310e80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8535c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e01a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bbb8c r4:853bb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bbb8c r4:8531a180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8535c800 r8:8531a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531a180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531a180 r8:80287e08 r7:eaf1de60 r6:8531a200 r5:8535c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaff9fb0 to 0xeaff9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310a80
INFO: task kworker/1:456:4555 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b9d04000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:457:4557 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:457 state:D stack:0 pid:4557 tgid:4557 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:8535e000
r4:8535e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8535e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310cc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8535e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0149000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bb78c r4:853bb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bb78c r4:8531a280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8535e000 r8:8531a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531a280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531a280 r8:80287e08 r7:eaff9e60 r6:8531a300 r5:8535e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb005fb0 to 0xeb005ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310a80
INFO: task kworker/1:457:4557 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: b9f50000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:458:4559 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:458 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf31d84 r8:00000002 r7:60000113 r6:eaf31d8c r5:8535ec00
r4:8535ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8535ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8535ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e08d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c078c r4:853c0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c078c r4:8531a380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8535ec00 r8:8531a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531a380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531a380 r8:80287e08 r7:eaff9e60 r6:8531a400 r5:8535ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf31fb0 to 0xeaf31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310d00
INFO: task kworker/1:458:4559 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ba22b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:459:4560 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:459 state:D stack:0 pid:4560 tgid:4560 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf45d84 r8:00000002 r7:60000113 r6:eaf45d8c r5:8535d400
r4:8535d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8535d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853252c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8535d400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c0b8c r4:853c0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c0b8c r4:8531a480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8535d400 r8:8531a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531a480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531a480 r8:80287e08 r7:eaf31e60 r6:8531a500 r5:8535d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf45fb0 to 0xeaf45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85310d00
INFO: task kworker/1:459:4560 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ba67d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:260:4563 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:260 state:D stack:0 pid:4563 tgid:4563 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf71d84 r8:00000002 r7:60000013 r6:eaf71d8c r5:8535b000
r4:8535b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8535b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8535b000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0893000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c038c r4:853c0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853c038c r4:8531e700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8535b000 r8:8531e72c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8531e700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531e700 r8:80287e08 r7:eafe5e60 r6:8531a580 r5:8535b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf71fb0 to 0xeaf71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8531b740
INFO: task kworker/0:260:4563 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ba67d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:261:4566 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:261 state:D stack:0 pid:4566 tgid:4566 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf4dd84 r8:00000002 r7:60000113 r6:eaf4dd8c r5:8535bc00
r4:8535bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8535bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547dec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8535bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0bd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f438c r4:853f4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853f438c r4:8531e780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8535bc00 r8:8531e7ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8531e780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531e780 r8:80287e08 r7:eafe5e60 r6:8531a600 r5:8535bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf4dfb0 to 0xeaf4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8531be00
INFO: task kworker/0:261:4566 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: baab0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:460:4568 blocked for more than 453 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:460 state:D stack:0 pid:4568 tgid:4568 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf65d84 r8:00000002 r7:60000113 r6:eaf65d8c r5:85368000
r4:85368000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85368000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85368000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaac1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c0f8c r4:853c0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c0f8c r4:8531a680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85368000 r8:8531a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531a680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531a680 r8:80287e08 r7:eaf45e60 r6:8531a700 r5:85368000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf65fb0 to 0xeaf65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85325140
INFO: task kworker/1:460:4568 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bacca000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
INFO: task kworker/1:461:4570 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:461 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf59d84 r8:00000002 r7:60000013 r6:eaf59d8c r5:85368c00
r4:85368c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85368c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85368c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaae9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c138c r4:853c1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
r4:8530e480
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c178c r4:853c1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c178c r4:8531a880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85369800 r8:8531a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531a880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531a880 r8:80287e08 r7:eaf59e60 r6:8531a900 r5:85369800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf7dfb0 to 0xeaf7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85325380
INFO: task kworker/1:462:4572 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:00000001
Not tainted 6.15.0-rc7-syzkaller #0
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r7:ddde2d80 r6:83018200 r5:853c278c r4:8531a980
Call trace:
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
dfa0: 00000000 00000000 00000000 00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325840
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8536b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab29000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c1b8c r4:853c1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c1b8c r4:8531aa80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8536b000 r8:8531aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531aa80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531aa80 r8:80287e08 r7:eb00de60 r6:8531ab00 r5:8536b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb019fb0 to 0xeb019ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85325640
INFO: task kworker/1:464:4576 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bc3d4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:465:4577 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:465 state:D stack:0 pid:4577 tgid:4577 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:8536bc00
r4:8536bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8536bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325a40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8536bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c1f8c r4:853c1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c1f8c r4:8531ab80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8536bc00 r8:8531abac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531ab80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531ab80 r8:80287e08 r7:eb00de60 r6:8531ac00 r5:8536bc00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xeae7dd28 to 0xeae7dd70)
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:466:4580 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:466 state:D stack:0 pid:4580 tgid:4580 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb029d84 r8:00000002 r7:60000113 r6:eb029d8c r5:8536c800
r4:8536c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8536c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325c40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8536c800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:853c238c r4:853c2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c238c r4:8531ac80
r10:61c88647 r9:8536c800 r8:8531acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
dd20: bce59000 df9c1000 00000001 80239b98 7f3cb000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:467:4582 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:467 state:D stack:0 pid:4582 tgid:4582 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb035d84 r8:00000002 r7:60000113 r6:eb035d8c r5:8536d400
r4:8536d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8536d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325f40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8536d400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c2b8c r4:853c2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c2b8c r4:8531ad80
r10:61c88647 r9:8536d400 r8:8531adac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fa0: 00000000 00000000 00000000 00000000
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:468:4584 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:468 state:D stack:0 pid:4584 tgid:4584 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb039d84 r8:00000002 r7:60000113 r6:eb039d8c r5:8536e000
r4:8536e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8536e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531be00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8536e000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c2f8c r4:853c2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c2f8c r4:8531ae80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8536e000 r8:8531aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531ae80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531ae80 r8:80287e08 r7:eb035e60 r6:8531af00 r5:8536e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb039fb0 to 0xeb039ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85325d40
INFO: task kworker/1:468:4584 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bd5d3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:469:4587 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:469 state:D stack:0 pid:4587 tgid:4587 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:8291a684 r9:eb03dd84 r8:00000002 r7:60000113 r6:eb03dd8c r5:8536ec00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339040
r5:853c338c r4:853c3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c338c r4:8531af80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8536ec00 r8:8531afac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8531af80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8531af80 r8:80287e08 r7:eb039e60 r6:85337000 r5:8536ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb03dfb0 to 0xeb03dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85339080
INFO: task kworker/1:469:4587 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bdd8b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r5:85370000 r4:8291a680
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85370000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaefd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c3b8c r4:853c3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c3b8c r4:85337080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85370000 r8:853370ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337080 r8:80287e08 r7:eb03de60 r6:85337100 r5:85370000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb041fb0 to 0xeb041ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85339140
INFO: task kworker/1:470:4588 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bdd8b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85371800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaebf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c378c r4:853c3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c378c r4:85337180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85371800 r8:853371ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:472:4592 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:472 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb049d84 r8:00000002 r7:60000013 r6:eb049d8c r5:85373000
r4:85373000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85373000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85373000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf39000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c3f8c r4:853c3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c3f8c r4:85337280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85373000 r8:853372ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337280 r8:80287e08 r7:eb041e60 r6:85337300 r5:85373000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb049fb0 to 0xeb049ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85339400
INFO: task kworker/1:472:4592 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
dd20: be63c000 df9c1000 00000001 80239b98 7f3cb000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:473:4594 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:473 state:D stack:0 pid:4594 tgid:4594 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:85373c00
r4:85373c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85373c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339cc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85373c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:853ccb8c r4:853cc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ccb8c r4:85337380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85373c00 r8:853373ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337380 r8:80287e08 r7:eb049e60 r6:85337480 r5:85373c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:474:4595 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:474 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:85374800
r4:85374800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85374800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85374800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf49000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cc38c r4:853cc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cc38c r4:85337400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85374800 r8:8533742c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337400 r8:80287e08 r7:eb04de60 r6:85337500 r5:85374800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb051fb0 to 0xeb051ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85339840
INFO: task kworker/1:474:4595 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: beab6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:475:4598 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:475 state:D stack:0 pid:4598 tgid:4598 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:85370c00
r4:85370c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85370c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339b80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85370c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf79000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cc78c r4:853cc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cc78c r4:85337580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85370c00 r8:853375ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337580 r8:80287e08 r7:eb04de60 r6:85337600 r5:85370c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb045fb0 to 0xeb045ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85339a00
INFO: task kworker/1:475:4598 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bed57000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:476:4600 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:476 state:D stack:0 pid:4600 tgid:4600 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb055d84 r8:00000002 r7:60000113 r6:eb055d8c r5:85375400
r4:85375400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85375400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339e40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85375400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb05f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853ccf8c r4:853ccc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ccf8c r4:85337680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85375400 r8:853376ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337680 r8:80287e08 r7:eb04de60 r6:85337700 r5:85375400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb055fb0 to 0xeb055ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85339b40
INFO: task kworker/1:476:4600 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bf12c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:477:4602 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:477 state:D stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb05dd84 r8:00000002 r7:60000013 r6:eb05dd8c r5:85376000
r4:85376000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85376000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85376000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb083000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cd78c r4:853cd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cd78c r4:85337780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85376000 r8:853377ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337780 r8:80287e08 r7:eb055e60 r6:85337800 r5:85376000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb05dfb0 to 0xeb05dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85339c40
INFO: task kworker/1:477:4602 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bf37f000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:478:4603 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:478 state:D stack:0 pid:4603 tgid:4603 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb071d84 r8:00000002 r7:60000113 r6:eb071d8c r5:85376c00
r4:85376c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85376c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325f80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85376c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb06b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cd38c r4:853cd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cd38c r4:85337880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85376c00 r8:853378ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337880 r8:80287e08 r7:eb05de60 r6:85337900 r5:85376c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb071fb0 to 0xeb071ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85339c40
INFO: task kworker/1:478:4603 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bf37f000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:479:4606 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:479 state:D stack:0 pid:4606 tgid:4606 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb069d84 r8:00000002 r7:60000013 r6:eb069d8c r5:85372400
r4:85372400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85372400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85372400 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9d1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cdb8c r4:853cd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cdb8c r4:85337980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85372400 r8:853379ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337980 r8:80287e08 r7:eb05de60 r6:85337a00 r5:85372400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb069fb0 to 0xeb069ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462000
INFO: task kworker/1:479:4606 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bf519000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:480:4608 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:480 state:D stack:0 pid:4608 tgid:4608 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb091d84 r8:00000002 r7:60000013 r6:eb091d8c r5:85428000
r4:85428000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85428000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85428000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa87000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cdf8c r4:853cdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cdf8c r4:85337a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85428000 r8:85337aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337a80 r8:80287e08 r7:eb069e60 r6:85337b00 r5:85428000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb091fb0 to 0xeb091ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462180
INFO: task kworker/1:480:4608 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bf950000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:481:4610 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:481 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:85393c00
r4:85393c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85393c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462b80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85393c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0567000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cf38c r4:853cf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cf38c r4:85337b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85393c00 r8:85337bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337b80 r8:80287e08 r7:eb091e60 r6:8531e800 r5:85393c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb099fb0 to 0xeb099ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462280
INFO: task kworker/1:481:4610 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bfc75000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:482:4612 blocked for more than 454 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:482 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb0b1d84 r8:00000002 r7:60000113 r6:eb0b1d8c r5:85396000
r4:85396000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85396000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854625c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85396000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfce5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853ce38c r4:853ce000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ce38c r4:85337c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85396000 r8:85337c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337c00 r8:80287e08 r7:eb099e60 r6:8531e880 r5:85396000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b1fb0 to 0xeb0b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462440
INFO: task kworker/1:482:4612 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bfd98000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:483:4613 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:483 state:D stack:0 pid:4613 tgid:4613 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb0b5d84 r8:00000002 r7:60000113 r6:eb0b5d8c r5:85390c00
r4:85390c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85390c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85390c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfed7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853ce78c r4:853ce400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ce78c r4:85337c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85390c00 r8:85337cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337c80 r8:80287e08 r7:eb099e60 r6:8531e900 r5:85390c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b5fb0 to 0xeb0b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462440
INFO: task kworker/1:483:4613 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: bfee6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:484:4617 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:484 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eacb9d84 r8:00000002 r7:60000113 r6:eacb9d8c r5:85396c00
r4:85396c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85396c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462900
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85396c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0007000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853ceb8c r4:853ce800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ceb8c r4:85337d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85396c00 r8:85337d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337d00 r8:80287e08 r7:eb099e60 r6:8531e980 r5:85396c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb9fb0 to 0xeacb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462780
INFO: task kworker/1:484:4617 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c00e5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:485:4618 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:485 state:D stack:0 pid:4618 tgid:4618 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb0b9d84 r8:00000002 r7:60000013 r6:eb0b9d8c r5:85395400
r4:85395400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85395400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462a80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85395400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cef8c r4:853cec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cef8c r4:85337d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85395400 r8:85337dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337d80 r8:80287e08 r7:eb099e60 r6:8531ea00 r5:85395400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b9fb0 to 0xeb0b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462540
INFO: task kworker/1:485:4618 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c04c3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:486:4622 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:486 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb0e1d84 r8:00000002 r7:60000113 r6:eb0e1d8c r5:84a80c00
r4:84a80c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a80c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462c80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0636000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cf78c r4:853cf400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cf78c r4:85337e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a80c00 r8:85337e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337e00 r8:80287e08 r7:eb099e60 r6:8531ea80 r5:84a80c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e1fb0 to 0xeb0e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462980
INFO: task kworker/1:486:4622 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c0744000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:487:4623 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:487 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb0f1d84 r8:00000002 r7:60000113 r6:eb0f1d8c r5:84a81800
r4:84a81800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a81800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854740c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e07ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d478c r4:853d4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d478c r4:85337e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a81800 r8:85337eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337e80 r8:80287e08 r7:eb0e1e60 r6:8531eb00 r5:84a81800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0f1fb0 to 0xeb0f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462980
INFO: task kworker/1:487:4623 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c0958000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:488:4625 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:488 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb0f9d84 r8:00000002 r7:60000113 r6:eb0f9d8c r5:84a80000
r4:84a80000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a80000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a80000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0693000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cfb8c r4:853cf800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cfb8c r4:85337f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a80000 r8:85337f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337f00 r8:80287e08 r7:eb0f1e60 r6:8531eb80 r5:84a80000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0f9fb0 to 0xeb0f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462c40
INFO: task kworker/1:488:4625 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c0c74000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:489:4626 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:489 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb10dd84 r8:00000002 r7:60000113 r6:eb10dd8c r5:84a83000
r4:84a83000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a83000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462f40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a83000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853cff8c r4:853cfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853cff8c r4:85337f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a83000 r8:85337fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85337f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85337f80 r8:80287e08 r7:eb0f1e60 r6:8531ec00 r5:84a83000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb10dfb0 to 0xeb10dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462c40
INFO: task kworker/1:489:4626 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c0ea6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:490:4628 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:490 state:D stack:0 pid:4628 tgid:4628 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb115d84 r8:00000002 r7:60000113 r6:eb115d8c r5:84a84800
r4:84a84800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a84800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb115e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462640
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a84800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0785000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d438c r4:853d4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d438c r4:85469000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a84800 r8:8546902c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469000 r8:80287e08 r7:eb0f1e60 r6:8531ec80 r5:84a84800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb115fb0 to 0xeb115ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85462d40
INFO: task kworker/1:490:4628 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c1626000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:491:4631 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:491 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb121d84 r8:00000002 r7:60000013 r6:eb121d8c r5:84a83c00
r4:84a83c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a83c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854746c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac15000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d578c r4:853d5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d578c r4:85469080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a83c00 r8:854690ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469080 r8:80287e08 r7:eb0f1e60 r6:8531ed00 r5:84a83c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb121fb0 to 0xeb121ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85474000
INFO: task kworker/1:491:4631 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c1626000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:492:4632 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:492 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb125d84 r8:00000002 r7:60000113 r6:eb125d8c r5:84a85400
r4:84a85400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a85400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a85400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0839000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d4b8c r4:853d4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d4b8c r4:85469100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a85400 r8:8546912c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469100 r8:80287e08 r7:eb121e60 r6:8531ed80 r5:84a85400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb125fb0 to 0xeb125ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85474000
INFO: task kworker/1:492:4632 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c1e3a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:493:4634 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:493 state:D stack:0 pid:4634 tgid:4634 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb12dd84 r8:00000002 r7:60000013 r6:eb12dd8c r5:84a86000
r4:84a86000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a86000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a86000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e08e5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d4f8c r4:853d4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d4f8c r4:85469180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a86000 r8:854691ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469180 r8:80287e08 r7:eb121e60 r6:8531ee00 r5:84a86000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb12dfb0 to 0xeb12dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85474240
INFO: task kworker/1:493:4634 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c2230000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:494:4636 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:494 state:D stack:0 pid:4636 tgid:4636 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb09dd84 r8:00000002 r7:60000113 r6:eb09dd8c r5:85429800
r4:85429800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85429800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85429800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8a01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d538c r4:853d5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d538c r4:85469200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85429800 r8:8546922c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469200 r8:80287e08 r7:eb121e60 r6:85469280 r5:85429800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb09dfb0 to 0xeb09dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85474280
INFO: task kworker/1:494:4636 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c26ed000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:495:4639 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:495 state:D stack:0 pid:4639 tgid:4639 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:8542a400
r4:8542a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474840
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542a400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac41000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d5b8c r4:853d5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d5b8c r4:85469300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542a400 r8:8546932c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469300 r8:80287e08 r7:eb121e60 r6:85469380 r5:8542a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb131fb0 to 0xeb131ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85474540
INFO: task kworker/1:495:4639 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c2ccc000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:496:4640 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:496 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb135d84 r8:00000002 r7:60000113 r6:eb135d8c r5:8542b000
r4:8542b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474bc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac7d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d638c r4:853d6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d638c r4:85469400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542b000 r8:8546942c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469400 r8:80287e08 r7:eb131e60 r6:85469480 r5:8542b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb135fb0 to 0xeb135ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85474780
INFO: task kworker/1:496:4640 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c2ccc000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:497:4643 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:497 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854749c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac67000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d5f8c r4:853d5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d5f8c r4:85469500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542c800 r8:8546952c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469500 r8:80287e08 r7:eb135e60 r6:85469580 r5:8542c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb13dfb0 to 0xeb13dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854747c0
INFO: task kworker/1:497:4643 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c3483000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:498:4645 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:498 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:8542e000
r4:8542e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474e80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542e000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacd3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d6b8c r4:853d6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d6b8c r4:85469600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542e000 r8:8546962c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469600 r8:80287e08 r7:eb135e60 r6:85469680 r5:8542e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb079fb0 to 0xeb079ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854747c0
INFO: task kworker/1:498:4645 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c366d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:499:4647 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:499 state:D stack:0 pid:4647 tgid:4647 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r4:8542bc00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:eaca9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d678c r4:853d6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d678c r4:85469700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542bc00 r8:8546972c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469700 r8:80287e08 r7:eb079e60 r6:85469780 r5:8542bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb139fb0 to 0xeb139ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85474b40
INFO: task kworker/1:499:4647 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c3f07000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:500:4650 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:500 state:D stack:0 pid:4650 tgid:4650 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb141d84 r8:00000002 r7:60000013 r6:eb141d8c r5:8542ec00
r4:8542ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853309c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae31000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d778c r4:853d7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d778c r4:85469800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542ec00 r8:8546982c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469800 r8:80287e08 r7:eb079e60 r6:85469880 r5:8542ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb141fb0 to 0xeb141ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85474d00
INFO: task kworker/1:500:4650 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c4399000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:501:4651 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:501 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:8542d400
r4:8542d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474fc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadb7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853d6f8c r4:853d6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d6f8c r4:85469900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542d400 r8:8546992c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469900 r8:80287e08 r7:eb141e60 r6:85469980 r5:8542d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb145fb0 to 0xeb145ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85474e40
INFO: task kworker/1:501:4651 is blocked on a mutex likely owned by task kworker/1:417:4402.
r4:00000000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
Workqueue: events bpf_prog_free_deferred
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08
r5:853d738c r4:853d7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853d738c r4:85469a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85428c00 r8:85469a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469a00 r8:80287e08 r7:eb141e60 r6:85469a80 r5:85428c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb149fb0 to 0xeb149ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85330380
INFO: task kworker/1:502:4654 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c4ffd000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:85cd538c r4:85cd5000
r4:00000001
r4:8530e480
r10:8291a684 r9:eb14dd84 r8:00000002 r7:60000113 r6:eb14dd8c r5:85430000
r4:00000000
r5:853d7b8c r4:853d7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
dd60: 80230ad0 80239bb0 80070113 ffffffff
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:504:4657 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:504 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08
r5:853dc38c r4:853dc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:00001000 r4:ed8b3000
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:505:4658 blocked for more than 455 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:505 state:D stack:0 pid:4658 tgid:4658 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb159d84 r8:00000002 r7:60000013 r6:eb159d8c r5:85431800
r4:85431800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:853d7f8c r4:853d7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85431800 r8:85469d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469d00 r8:80287e08 r7:eb151e60 r6:85469d80 r5:85431800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb159fb0 to 0xeb159ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8548d040
INFO: task kworker/1:505:4658 is blocked on a mutex likely owned by task kworker/1:417:4402.
Exception stack(0xeae7dd28 to 0xeae7dd70)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
Call trace:
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08
r5:853dc78c r4:853dc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84a86c00 r8:85469e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469e00 r8:80287e08 r7:eb151e60 r6:8531ee80 r5:84a86c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb161fb0 to 0xeb161ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8548d300
INFO: task kworker/1:506:4661 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c5f91000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:8530a300
r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r5:853dcb8c r4:853dc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853dcb8c r4:85469e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:85469e80
Exception stack(0xeb165fb0 to 0xeb165ff8)
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r4:8538a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8538a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548dc00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8538a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa47000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853dd78c r4:853dd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853dd78c r4:85469f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8538a400 r8:85469f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469f00 r8:80287e08 r7:eb165e60 r6:8531ef80 r5:8538a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb169fb0 to 0xeb169ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8548d680
INFO: task kworker/1:508:4664 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c65f2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:00000000
r5:85cd538c r4:85cd5000
r4:8530a300
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:8530e480
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:00001000 r4:e08a3000
r5:853f4b8c r4:853f4800
r7:dddced80 r6:83018000 r5:853f4b8c r4:85496000
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xeae7dd28 to 0xeae7dd70)
r4:eae7ddc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:85398000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85398000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548d740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85398000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853dcf8c r4:853dcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853dcf8c r4:85469f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85398000 r8:85469fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85469f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85469f80 r8:80287e08 r7:eb169e60 r6:85496100 r5:85398000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb16dfb0 to 0xeb16dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8548d740
INFO: task kworker/1:509:4668 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c6be4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:510:4671 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:510 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:8539a400
r4:8539a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8539a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548da80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8539a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb173000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853dd38c r4:853dd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853dd38c r4:85493000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8539a400 r8:8549302c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493000 r8:80287e08 r7:eb169e60 r6:85496180 r5:8539a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb181fb0 to 0xeb181ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8548d940
INFO: task kworker/1:510:4671 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c6fb7000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:511:4672 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:511 state:D stack:0 pid:4672 tgid:4672 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:85398c00
r4:85398c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85398c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548dd80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85398c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbc1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853ddb8c r4:853dd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ddb8c r4:85493080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85398c00 r8:854930ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493080 r8:80287e08 r7:eb169e60 r6:85496200 r5:85398c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb185fb0 to 0xeb185ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8548d940
INFO: task kworker/1:511:4672 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c76cb000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:512:4674 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:512 state:D stack:0 pid:4674 tgid:4674 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:85399800
r4:85399800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85399800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549e740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85399800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab21000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853df78c r4:853df400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853df78c r4:85493100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85399800 r8:8549312c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493100 r8:80287e08 r7:eb185e60 r6:85496280 r5:85399800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb059fb0 to 0xeb059ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8548d980
INFO: task kworker/1:512:4674 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c7dff000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:513:4676 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:513 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb089d84 r8:00000002 r7:60000113 r6:eb089d8c r5:8539b000
r4:8539b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8539b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548dec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8539b000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe83000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853ddf8c r4:853ddc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ddf8c r4:85493180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8539b000 r8:854931ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493180 r8:80287e08 r7:eb059e60 r6:85496300 r5:8539b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb089fb0 to 0xeb089ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8548db80
INFO: task kworker/1:513:4676 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c81ea000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:514:4679 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:514 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb195d84 r8:00000002 r7:60000113 r6:eb195d8c r5:8539bc00
r4:8539bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8539bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548dfc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8539bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffe7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853de38c r4:853de000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853de38c r4:85493200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8539bc00 r8:8549322c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493200 r8:80287e08 r7:eb059e60 r6:85496380 r5:8539bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb195fb0 to 0xeb195ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8548dd40
INFO: task kworker/1:514:4679 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c85fd000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:515:4682 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:515 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:85432400
r4:85432400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85432400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6ff80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85432400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e01c5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853de78c r4:853de400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853de78c r4:85493280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85432400 r8:854932ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493280 r8:80287e08 r7:eb059e60 r6:85493300 r5:85432400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb15dfb0 to 0xeb15dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84a6f780
INFO: task kworker/1:515:4682 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c8975000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:516:4683 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:516 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:85434800
r4:85434800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85434800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85434800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e051c000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853deb8c r4:853de800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853deb8c r4:85493380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85434800 r8:854933ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493380 r8:80287e08 r7:eb059e60 r6:85493400 r5:85434800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb199fb0 to 0xeb199ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8547da80
INFO: task kworker/1:516:4683 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c89da000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:517:4686 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:517 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb19dd84 r8:00000002 r7:60000113 r6:eb19dd8c r5:85436000
r4:85436000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85436000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549e500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85436000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaabf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853def8c r4:853dec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853def8c r4:85493480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85436000 r8:854934ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493480 r8:80287e08 r7:eb059e60 r6:85493500 r5:85436000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb19dfb0 to 0xeb19dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84a6f780
INFO: task kworker/1:517:4686 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c8df2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:263:4687 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:263 state:D stack:0 pid:4687 tgid:4687 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:85433c00
r4:85433c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85433c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dab40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85433c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf81000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f678c r4:853f6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853f678c r4:85496400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85433c00 r8:8549642c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85496400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85496400 r8:80287e08 r7:eafe5e60 r6:85493580 r5:85433c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a1fb0 to 0xeb1a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a1580
INFO: task kworker/0:263:4687 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c905b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:264:4689 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:264 state:D stack:0 pid:4689 tgid:4689 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1a9d84 r8:00000002 r7:60000113 r6:eb1a9d8c r5:85435400
r4:85435400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85435400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1d00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85435400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaec7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f538c r4:853f5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853f538c r4:85496480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85435400 r8:854964ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85496480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85496480 r8:80287e08 r7:eb1a1e60 r6:85493600 r5:85435400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a9fb0 to 0xeb1a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a1580
INFO: task kworker/0:264:4689 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c94b2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:518:4692 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:518 state:D stack:0 pid:4692 tgid:4692 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1a5d84 r8:00000002 r7:60000013 r6:eb1a5d8c r5:85436c00
r4:85436c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85436c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549e5c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85436c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaaef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853df38c r4:853df000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853df38c r4:85493680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85436c00 r8:854936ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493680 r8:80287e08 r7:eb059e60 r6:85493700 r5:85436c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a5fb0 to 0xeb1a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8549e440
INFO: task kworker/1:518:4692 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c94b2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:519:4694 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:519 state:D stack:0 pid:4694 tgid:4694 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb171d84 r8:00000002 r7:60000113 r6:eb171d8c r5:85433000
r4:85433000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85433000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb171e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ea40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85433000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacfb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853dff8c r4:853dfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853dff8c r4:85493780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85433000 r8:854937ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493780 r8:80287e08 r7:eb059e60 r6:85493800 r5:85433000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb171fb0 to 0xeb171ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8549e540
INFO: task kworker/1:519:4694 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c9836000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:853dfb8c r4:853df800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853dfb8c r4:85493880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85438000 r8:854938ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493880 r8:80287e08 r7:eb171e60 r6:85493900 r5:85438000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1adfb0 to 0xeb1adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8549e800
INFO: task kworker/1:520:4695 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c9a57000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:521:4698 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:521 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1b1d84 r8:00000002 r7:60000113 r6:eb1b1d8c r5:85438c00
r4:85438c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85438c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ebc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85438c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e438c r4:853e4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e438c r4:85493980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85438c00 r8:854939ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493980 r8:80287e08 r7:eb171e60 r6:85493a00 r5:85438c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1b1fb0 to 0xeb1b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8549e840
INFO: task kworker/1:521:4698 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c9bf3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:522:4700 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:522 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:85439800
r4:85439800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85439800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ed00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85439800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae59000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e478c r4:853e4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e478c r4:85493a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85439800 r8:85493aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493a80 r8:80287e08 r7:eb1b1e60 r6:85493b00 r5:85439800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1b5fb0 to 0xeb1b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8549e9c0
INFO: task kworker/1:522:4700 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: c9ddc000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:523:4702 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:523 state:D stack:0 pid:4702 tgid:4702 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8543a400
r4:8543a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8543a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ef40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8543a400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae81000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e4b8c r4:853e4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e4b8c r4:85493b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8543a400 r8:85493bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493b80 r8:80287e08 r7:eb1b5e60 r6:85493c00 r5:8543a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb191fb0 to 0xeb191ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8549e9c0
INFO: task kworker/1:523:4702 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ca129000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:524:4704 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:524 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1b9d84 r8:00000002 r7:60000113 r6:eb1b9d8c r5:8543b000
r4:8543b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8543b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8543b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaee1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e4f8c r4:853e4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e4f8c r4:85493c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8543b000 r8:85493cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493c80 r8:80287e08 r7:eb191e60 r6:85493d00 r5:8543b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1b9fb0 to 0xeb1b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8549edc0
INFO: task kworker/1:524:4704 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ca129000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:525:4705 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:525 state:D stack:0 pid:4705 tgid:4705 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1c5d84 r8:00000002 r7:60000113 r6:eb1c5d8c r5:8543c800
r4:8543c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8543c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8543c800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf09000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e538c r4:853e5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e538c r4:85493d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8543c800 r8:85493dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493d80 r8:80287e08 r7:eb1b9e60 r6:85493e00 r5:8543c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c5fb0 to 0xeb1c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8549ee40
INFO: task kworker/1:525:4705 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ca4f4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:526:4708 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:526 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1bdd84 r8:00000002 r7:60000013 r6:eb1bdd8c r5:8543d400
r4:8543d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8543d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8543d400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf3d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e578c r4:853e5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e578c r4:85493e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8543d400 r8:85493eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493e80 r8:80287e08 r7:eb1c5e60 r6:85493f00 r5:8543d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1bdfb0 to 0xeb1bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854af1c0
INFO: task kworker/1:526:4708 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ca760000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:265:4710 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:265 state:D stack:0 pid:4710 tgid:4710 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:8539ec00
r4:8539ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8539ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc840
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8539ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac4d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ee78c r4:854ee400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854ee78c r4:85496500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8539ec00 r8:8549652c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85496500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85496500 r8:80287e08 r7:eb1a1e60 r6:85496580 r5:8539ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c9fb0 to 0xeb1c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a1c40
INFO: task kworker/0:265:4710 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ca8f7000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:527:4712 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:527 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1c1d84 r8:00000002 r7:60000113 r6:eb1c1d8c r5:8543ec00
r4:8543ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8543ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af5c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8543ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf6d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e5b8c r4:853e5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e5b8c r4:85493f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8543ec00 r8:85493fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85493f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85493f80 r8:80287e08 r7:eb1bde60 r6:854ad000 r5:8543ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c1fb0 to 0xeb1c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854af300
INFO: task kworker/1:527:4712 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cac8f000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:528:4714 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:528 state:D stack:0 pid:4714 tgid:4714 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1d1d84 r8:00000002 r7:60000013 r6:eb1d1d8c r5:8543bc00
r4:8543bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8543bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854afc00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8543bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e678c r4:853e6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e678c r4:854ad080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8543bc00 r8:854ad0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ad080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ad080 r8:80287e08 r7:eb1c1e60 r6:854ad100 r5:8543bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1d1fb0 to 0xeb1d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854af440
INFO: task kworker/1:528:4714 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: caf22000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:529:4715 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:529 state:D stack:0 pid:4715 tgid:4715 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1d5d84 r8:00000002 r7:60000113 r6:eb1d5d8c r5:85440000
r4:85440000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85440000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85440000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb00f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e5f8c r4:853e5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e5f8c r4:854ad180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85440000 r8:854ad1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ad180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ad180 r8:80287e08 r7:eb1d1e60 r6:854ad200 r5:85440000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1d5fb0 to 0xeb1d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854af440
INFO: task kworker/1:529:4715 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: caf22000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:530:4717 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:530 state:D stack:0 pid:4717 tgid:4717 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1d9d84 r8:00000002 r7:60000113 r6:eb1d9d8c r5:85441800
r4:85441800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85441800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854afa40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85441800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb06d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e638c r4:853e6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e638c r4:854ad280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85441800 r8:854ad2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ad280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ad280 r8:80287e08 r7:eb1d1e60 r6:854ad300 r5:85441800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1d9fb0 to 0xeb1d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854af840
INFO: task kworker/1:530:4717 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cb4a0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:531:4720 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:531 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1e9d84 r8:00000002 r7:60000013 r6:eb1e9d8c r5:85443000
r4:85443000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85443000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854aff00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85443000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e6b8c r4:853e6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e6b8c r4:854ad380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85443000 r8:854ad3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ad380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ad380 r8:80287e08 r7:eb1d1e60 r6:854ad400 r5:85443000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1e9fb0 to 0xeb1e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854afa80
INFO: task kworker/1:531:4720 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cb890000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:532:4721 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:532 state:D stack:0 pid:4721 tgid:4721 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1f5d84 r8:00000002 r7:60000113 r6:eb1f5d8c r5:85444800
r4:85444800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85444800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af100
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85444800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1f7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e6f8c r4:853e6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e6f8c r4:854ad480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85444800 r8:854ad4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ad480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ad480 r8:80287e08 r7:eb1e9e60 r6:854ad500 r5:85444800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1f5fb0 to 0xeb1f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854afd80
INFO: task kworker/1:532:4721 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cb890000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:533:4724 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:533 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb201d84 r8:00000002 r7:60000013 r6:eb201d8c r5:85445400
r4:85445400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85445400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85445400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb20f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e778c r4:853e7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e778c r4:854ad580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85445400 r8:854ad5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ad580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ad580 r8:80287e08 r7:eb1f5e60 r6:854ad600 r5:85445400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb201fb0 to 0xeb201ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854affc0
INFO: task kworker/1:533:4724 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cb890000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:534:4725 blocked for more than 456 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:534 state:D stack:0 pid:4725 tgid:4725 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb20dd84 r8:00000002 r7:60000013 r6:eb20dd8c r5:85443c00
r4:85443c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85443c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85443c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb203000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e738c r4:853e7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e738c r4:854ad680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85443c00 r8:854ad6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ad680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ad680 r8:80287e08 r7:eb201e60 r6:854ad700 r5:85443c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb20dfb0 to 0xeb20dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854b3080
INFO: task kworker/1:534:4725 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cbe93000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:535:4728 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:535 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1e5d84 r8:00000002 r7:60000113 r6:eb1e5d8c r5:85442400
r4:85442400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85442400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85442400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb217000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e7b8c r4:853e7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e7b8c r4:854ad780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85442400 r8:854ad7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ad780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ad780 r8:80287e08 r7:eb201e60 r6:854ad800 r5:85442400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1e5fb0 to 0xeb1e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854b3280
INFO: task kworker/1:535:4728 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cbe93000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:536:4730 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:536 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1cdd84 r8:00000002 r7:60000113 r6:eb1cdd8c r5:85446c00
r4:85446c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85446c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1cde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3700
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85446c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb223000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853e7f8c r4:853e7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853e7f8c r4:854ad880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85446c00 r8:854ad8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ad880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ad880 r8:80287e08 r7:eb1e5e60 r6:854ad900 r5:85446c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1cdfb0 to 0xeb1cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854b3300
INFO: task kworker/1:536:4730 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cc1ec000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:537:4732 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:537 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb221d84 r8:00000002 r7:60000013 r6:eb221d8c r5:85446000
r4:85446000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85446000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3840
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85446000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb22f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854e838c r4:854e8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854e838c r4:854ad980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85446000 r8:854ad9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ad980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ad980 r8:80287e08 r7:eb1cde60 r6:854ada00 r5:85446000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb221fb0 to 0xeb221ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854b3580
INFO: task kworker/1:537:4732 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cc463000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:538:4735 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:538 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb22dd84 r8:00000002 r7:60000013 r6:eb22dd8c r5:85440c00
r4:85440c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85440c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85440c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb25f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854e938c r4:854e9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854e938c r4:854ada80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85440c00 r8:854adaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854ada80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ada80 r8:80287e08 r7:eb221e60 r6:854adb00 r5:85440c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb22dfb0 to 0xeb22dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854b36c0
INFO: task kworker/1:538:4735 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cc87b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
INFO: task kworker/1:539:4736 blocked for more than 457 seconds.
r10:8291a684 r9:eb245d84 r8:00000002 r7:60000013 r6:eb245d8c r5:85448000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb245e08
r9:83018205 r8:85448000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
r5:854e878c r4:854e8400
r7:ddde2d80 r6:83018200 r5:854e878c r4:854adb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:854b36c0
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cc87b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:540:4738 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:540 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb239d84 r8:00000002 r7:60000013 r6:eb239d8c r5:85448c00
r4:85448c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85448c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3b00
r5:854e8b8c r4:854e8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854e8b8c r4:854adc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:854adc80
Exception stack(0xeb239fb0 to 0xeb239ff8)
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:80070113 r4:80239bb0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:541 state:D stack:0 pid:4740 tgid:4740 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:854e8f8c r4:854e8c00
r7:ddde2d80 r6:83018200 r5:854e8f8c r4:854add80
r4:854add80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854add80 r8:80287e08 r7:eb22de60 r6:854ade00 r5:85449800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb251fb0 to 0xeb251ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854b3a80
INFO: task kworker/1:541:4740 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cd22b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:542:4742 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:542 state:D stack:0 pid:4742 tgid:4742 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb25dd84 r8:00000002 r7:60000013 r6:eb25dd8c r5:8544a400
r4:8544a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8544a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3fc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8544a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb26b000
r5:854e978c r4:854e9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854e978c r4:854ade80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:854ade80
Exception stack(0xeb25dfb0 to 0xeb25dff8)
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:80070113 r4:80239bb0
r4:eae7ddc0
r5:00001000 r4:ed8b3000
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:8539e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
r5:854e9b8c r4:854e9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:8539e000 r8:854adfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb281fb0 to 0xeb281ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854af7c0
INFO: task kworker/1:543:4744 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cd627000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:544:4746 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:544 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb285d84 r8:00000002 r7:60000113 r6:eb285d8c r5:8539d400
r4:8539d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8539d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c60c0
r4:00000000
r9:83018205 r8:8539d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
r5:854ea38c r4:854ea000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ea38c r4:854c4000
r4:854c4000
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
r4:00000000
dd60: 80230ad0 80239bb0 80070113 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:545:4748 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:545 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb295d84 r8:00000002 r7:60000113 r6:eb295d8c r5:8543e000
r4:8543e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8543e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8543e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb287000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854e9f8c r4:854e9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854e9f8c r4:854c4080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8543e000 r8:854c40ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4080 r8:80287e08 r7:eb285e60 r6:85496700 r5:8543e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb295fb0 to 0xeb295ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8547da40
INFO: task kworker/1:545:4748 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cdbb0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:00001000 r4:eb2a3000
r5:854ea78c r4:854ea400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ea78c r4:854c4100
r4:854c4100
Exception stack(0xeb2b1fb0 to 0xeb2b1ff8)
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ce0ae000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:547:4752 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:547 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2b5d84 r8:00000002 r7:60000113 r6:eb2b5d8c r5:84b60000
r4:84b60000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b60000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r4:00000000
r5:00001000 r4:eb2b7000
r5:854eab8c r4:854ea800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854eab8c r4:854c4180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b60000 r8:854c41ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4180 r8:80287e08 r7:eb2b1e60 r6:85496800 r5:84b60000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2b5fb0 to 0xeb2b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c6240
INFO: task kworker/1:547:4752 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ce634000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:548:4754 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:548 state:D stack:0 pid:4754 tgid:4754 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:84b62400
r4:84b62400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b62400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c65c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b62400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2c3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854eaf8c r4:854eac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854eaf8c r4:854c4200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b62400 r8:854c422c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4200 r8:80287e08 r7:eb2b5e60 r6:85496880 r5:84b62400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2c1fb0 to 0xeb2c1ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:82ac21e4
r4:eae7ddc0
r5:00001000 r4:ed8b3000
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08
r9:83018205 r8:84b63000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
r5:854eb38c r4:854eb000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:854c4280
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:550:4758 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:550 state:D stack:0 pid:4758 tgid:4758 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb0d1d84 r8:00000002 r7:60000013 r6:eb0d1d8c r5:84b64800
r4:84b64800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b64800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6840
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b64800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa71000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:854eb78c r4:854eb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854eb78c r4:854c4300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
dd60: 80230ad0 80239bb0 80070113 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
Exception stack(0xeae7dfb0 to 0xeae7dff8)
Not tainted 6.15.0-rc7-syzkaller #0
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6940
r5:854ebb8c r4:854eb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:854c4380
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:552:4762 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:552 state:D stack:0 pid:4762 tgid:4762 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb179d84 r8:00000002 r7:60000013 r6:eb179d8c r5:84b66c00
r4:84b66c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b66c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb179e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6c00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ec38c r4:854ec000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ec38c r4:854c4400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b66c00 r8:854c442c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4400 r8:80287e08 r7:eb111e60 r6:85496a80 r5:84b66c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb179fb0 to 0xeb179ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c6740
INFO: task kworker/1:552:4762 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cee4a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:553:4763 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:553 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2d1d84 r8:00000002 r7:60000013 r6:eb2d1d8c r5:84b65400
r4:84b65400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b65400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6ac0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b65400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd89000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ebf8c r4:854ebc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ebf8c r4:854c4480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b65400 r8:854c44ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4480 r8:80287e08 r7:eb179e60 r6:85496b00 r5:84b65400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2d1fb0 to 0xeb2d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c6740
INFO: task kworker/1:553:4763 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cf07c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:554:4765 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:554 state:D stack:0 pid:4765 tgid:4765 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2d9d84 r8:00000002 r7:60000013 r6:eb2d9d8c r5:84b63c00
r4:84b63c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b63c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0563000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ec78c r4:854ec400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ec78c r4:854c4500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b63c00 r8:854c452c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4500 r8:80287e08 r7:eb179e60 r6:85496b80 r5:84b63c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2d9fb0 to 0xeb2d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c68c0
INFO: task kworker/1:554:4765 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cf2d6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:555:4769 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:555 state:D stack:0 pid:4769 tgid:4769 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb269d84 r8:00000002 r7:60000113 r6:eb269d8c r5:84b60c00
r4:84b60c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b60c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb269e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6f40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0640000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ecb8c r4:854ec800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ecb8c r4:854c4580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b60c00 r8:854c45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4580 r8:80287e08 r7:eb2d9e60 r6:85496c00 r5:84b60c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb269fb0 to 0xeb269ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c6a80
INFO: task kworker/1:555:4769 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cf537000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:556:4772 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:556 state:D stack:0 pid:4772 tgid:4772 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2ddd84 r8:00000002 r7:60000013 r6:eb2ddd8c r5:8539c800
r4:8539c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8539c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c63c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8539c800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06b5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ecf8c r4:854ecc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ecf8c r4:854c4600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8539c800 r8:854c462c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4600 r8:80287e08 r7:eb269e60 r6:85496c80 r5:8539c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2ddfb0 to 0xeb2ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c6bc0
INFO: task kworker/1:556:4772 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cf9a3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:557:4773 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:557 state:D stack:0 pid:4773 tgid:4773 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2e1d84 r8:00000002 r7:60000113 r6:eb2e1d8c r5:84a98000
r4:84a98000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a98000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a98000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0767000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ed38c r4:854ed000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ed38c r4:854c4680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a98000 r8:854c46ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4680 r8:80287e08 r7:eb2dde60 r6:85496d00 r5:84a98000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2e1fb0 to 0xeb2e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c6bc0
INFO: task kworker/1:557:4773 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cfe95000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:558:4775 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:558 state:D stack:0 pid:4775 tgid:4775 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:84a98c00
r4:84a98c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a98c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc340
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e07f7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ed78c r4:854ed400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ed78c r4:854c4700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a98c00 r8:854c472c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4700 r8:80287e08 r7:eb2e1e60 r6:85496d80 r5:84a98c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2e5fb0 to 0xeb2e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854cc100
INFO: task kworker/1:558:4775 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: cfe95000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
dfa0: 00000000 00000000 00000000 00000000
task:kworker/1:559 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2edd84 r8:00000002 r7:60000113 r6:eb2edd8c r5:84a9a400
r4:84a9a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a9a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc4c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:854edb8c r4:854ed800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854edb8c r4:854c4780
r10:61c88647 r9:84a9a400 r8:854c47ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d014d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:560:4779 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:560 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:84a9bc00
r4:84a9bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a9bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854da900
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae37000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f638c r4:853f6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853f638c r4:854c4800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a9bc00 r8:854c482c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4800 r8:80287e08 r7:eb2ede60 r6:85496e80 r5:84a9bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2f5fb0 to 0xeb2f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
dd20: d08c0000 df9c1000 00000001 80239b98 7f3cb000 00000001
r4:00000000
r5:85cd538c r4:85cd5000
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:561:4780 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:561 state:D stack:0 pid:4780 tgid:4780 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2f9d84 r8:00000002 r7:60000113 r6:eb2f9d8c r5:84a9c800
r4:84a9c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a9c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc600
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
r5:854edf8c r4:854edc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854edf8c r4:854c4880
r10:61c88647 r9:84a9c800 r8:854c48ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Not tainted 6.15.0-rc7-syzkaller #0
r10:8291a684 r9:eb301d84 r8:00000002 r7:60000113 r6:eb301d8c r5:84a9b000
r4:84a9b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a9b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc700
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac21000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ee38c r4:854ee000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ee38c r4:854c4900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a9b000 r8:854c492c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4900 r8:80287e08 r7:eb2f5e60 r6:85496f80 r5:84a9b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Not tainted 6.15.0-rc7-syzkaller #0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:854eeb8c r4:854ee800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:8291a684 r9:eb311d84 r8:00000002 r7:60000013 r6:eb311d8c r5:84a9e000
r5:00001000 r4:eacb5000
r5:854eef8c r4:854eec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854eef8c r4:854c4a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a9e000 r8:854c4a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4a00 r8:80287e08 r7:eb2f5e60 r6:854dd080 r5:84a9e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb311fb0 to 0xeb311ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854cca80
INFO: task kworker/1:564:4787 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d1185000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r4:82ac21e4
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
r4:00000001
INFO: task kworker/0:266:4788 blocked for more than 457 seconds.
r4:00000000
r9:83018005 r8:84a9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
r5:853f5b8c r4:853f5800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854da3c0
INFO: task kworker/0:266:4788 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d1185000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
r4:8530a300
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:853f5f8c r4:853f5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853f5f8c r4:854dd200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:565:4793 blocked for more than 457 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:565 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb305d84 r8:00000002 r7:60000113 r6:eb305d8c r5:8544bc00
r4:8544bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8544bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dad00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8544bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eafaf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f6b8c r4:853f6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853f6b8c r4:854c4a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8544bc00 r8:854c4aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4a80 r8:80287e08 r7:eb2f5e60 r6:854dd300 r5:8544bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb305fb0 to 0xeb305ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854cc9c0
Workqueue: events bpf_prog_free_deferred
dd20: d1a48000 df9c1000 00000001 80239b98 7f3cb000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:566:4795 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:566 state:D stack:0 pid:4795 tgid:4795 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb319d84 r8:00000002 r7:60000113 r6:eb319d8c r5:8544d400
r4:8544d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8544d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc900
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8544d400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ef38c r4:854ef000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ef38c r4:854c4b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8544d400 r8:854c4b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4b00 r8:80287e08 r7:eb305e60 r6:854dd380 r5:8544d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb319fb0 to 0xeb319ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854cc880
INFO: task kworker/1:566:4795 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d1c12000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r5:00001000 r4:ed8b3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r5:8544ec00 r4:8291a680
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dae00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8544ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eafdb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f6f8c r4:853f6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853f6f8c r4:854dd400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8544ec00 r8:854dd42c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854dd400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854dd400 r8:80287e08 r7:eb1a1e60 r6:854dd480 r5:8544ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb275fb0 to 0xeb275ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854da9c0
INFO: task kworker/0:268:4796 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d1c58000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:567:4799 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:567 state:D stack:0 pid:4799 tgid:4799 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:85528000
r4:85528000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85528000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854da140
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85528000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb175000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854eff8c r4:854efc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854eff8c r4:854c4b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85528000 r8:854c4bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4b80 r8:80287e08 r7:eb319e60 r6:854c4c00 r5:85528000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb321fb0 to 0xeb321ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854ccc00
INFO: task kworker/1:567:4799 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d1e4a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
r4:8530a300
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:269 state:D stack:0 pid:4800 tgid:4800 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb31dd84 r8:00000002 r7:60000113 r6:eb31dd8c r5:8544e000
r4:8544e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8544e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8544e000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab33000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f7f8c r4:853f7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853f7f8c r4:854dd500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8544e000 r8:854dd52c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854dd500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854dd500 r8:80287e08 r7:eb275e60 r6:854dd580 r5:8544e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb31dfb0 to 0xeb31dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
dd20: d2281000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:270:4802 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:270 state:D stack:0 pid:4802 tgid:4802 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854da300
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f738c r4:853f7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb329fb0 to 0xeb329ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854dac00
INFO: task kworker/0:270:4802 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d24d8000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:271:4804 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854efb8c r4:854ef800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854efb8c r4:854dd700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8544b000 r8:854dd72c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854dd700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854dd700 r8:80287e08 r7:eb31de60 r6:854dd780 r5:8544b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb325fb0 to 0xeb325ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854daf00
INFO: task kworker/0:271:4804 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d26cf000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:ed8b3000
dfa0: 00000000 00000000 00000000 00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:854c4c80
Workqueue: events bpf_prog_free_deferred
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
dfa0: 00000000 00000000 00000000 00000000
task:kworker/1:569 state:D stack:0 pid:4808 tgid:4808 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:84ac9800
r4:84ac9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ac9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ac9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb345000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f038c r4:854f0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f038c r4:854c4d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ac9800 r8:854c4d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4d00 r8:80287e08 r7:eb321e60 r6:854dd880 r5:84ac9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb33dfb0 to 0xeb33dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c9400
INFO: task kworker/1:569:4808 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d29c1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:272:4809 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:272 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb335d84 r8:00000002 r7:60000113 r6:eb335d8c r5:84aca400
r4:84aca400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84aca400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853f7b8c r4:853f7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:854dd900 r8:80287e08 r7:eb31de60 r6:854dd980 r5:84aca400
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d3200
INFO: task kworker/0:272:4809 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d30d0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:570:4813 blocked for more than 458 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84acb000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb365000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f0b8c r4:854f0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f0b8c r4:854c4d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84acb000 r8:854c4dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4d80 r8:80287e08 r7:eb33de60 r6:854dda00 r5:84acb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb35dfb0 to 0xeb35dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c9440
INFO: task kworker/1:570:4813 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d36a8000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6bc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84acc800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb351000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f078c r4:854f0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f078c r4:854c4e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84acc800 r8:854c4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4e00 r8:80287e08 r7:eb35de60 r6:854dda80 r5:84acc800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb361fb0 to 0xeb361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c9440
INFO: task kworker/1:571:4814 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d396e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:572:4816 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:572 state:D stack:0 pid:4816 tgid:4816 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb36dd84 r8:00000002 r7:60000113 r6:eb36dd8c r5:84acbc00
r4:84acbc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84acbc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f0f8c r4:854f0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f0f8c r4:854c4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84acbc00 r8:854c4eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4e80 r8:80287e08 r7:eb35de60 r6:854ddb00 r5:84acbc00
Exception stack(0xeb36dfb0 to 0xeb36dff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r4:00000000
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:573:4818 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:573 state:D stack:0 pid:4818 tgid:4818 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb385d84 r8:00000002 r7:60000013 r6:eb385d8c r5:84acd400
r4:84acd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84acd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb385e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0600
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f178c r4:854f1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f178c r4:854c4f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:854c4f00 r8:80287e08 r7:eb36de60 r6:854ddb80 r5:84acd400
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
dd60: 80230ad0 80239bb0 80070113 ffffffff
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
INFO: task kworker/1:574:4820 blocked for more than 458 seconds.
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d04c0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f138c r4:854f1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f138c r4:854c4f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84acec00 r8:854c4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854c4f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854c4f80 r8:80287e08 r7:eb385e60 r6:854ddc00 r5:84acec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb065fb0 to 0xeb065ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d0080
INFO: task kworker/1:574:4820 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d3dd0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:575:4824 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:575 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb379d84 r8:00000002 r7:60000013 r6:eb379d8c r5:8552bc00
r4:8552bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8552bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8552bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e01af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f1b8c r4:854f1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f1b8c r4:854d2000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8552bc00 r8:854d202c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2000 r8:80287e08 r7:eb385e60 r6:854d2080 r5:8552bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb379fb0 to 0xeb379ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d0480
INFO: task kworker/1:575:4824 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d3dd0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:576:4826 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:576 state:D stack:0 pid:4826 tgid:4826 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1e1d84 r8:00000002 r7:60000013 r6:eb1e1d8c r5:8552c800
r4:8552c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8552c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8552c800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0533000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f1f8c r4:854f1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f1f8c r4:854d2100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8552c800 r8:854d212c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2100 r8:80287e08 r7:eb379e60 r6:854d2180 r5:8552c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1e1fb0 to 0xeb1e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d0580
INFO: task kworker/1:576:4826 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d4493000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:577:4828 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:577 state:D stack:0 pid:4828 tgid:4828 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb331d84 r8:00000002 r7:60000013 r6:eb331d8c r5:8552a400
r4:8552a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8552a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0ac0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8552a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e08ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f238c r4:854f2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f238c r4:854d2200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8552a400 r8:854d222c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2200 r8:80287e08 r7:eb1e1e60 r6:854d2280 r5:8552a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb331fb0 to 0xeb331ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d02c0
INFO: task kworker/1:577:4828 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d4493000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:578:4830 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:578 state:D stack:0 pid:4830 tgid:4830 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1fdd84 r8:00000002 r7:60000013 r6:eb1fdd8c r5:8552d400
r4:8552d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8552d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0d40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8552d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaaad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f278c r4:854f2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f278c r4:854d2300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8552d400 r8:854d232c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2300 r8:80287e08 r7:eb331e60 r6:854d2380 r5:8552d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1fdfb0 to 0xeb1fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d0940
INFO: task kworker/1:578:4830 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d4493000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:579:4832 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:579 state:D stack:0 pid:4832 tgid:4832 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb209d84 r8:00000002 r7:60000113 r6:eb209d8c r5:8552ec00
r4:8552ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8552ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c9340
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8552ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f2b8c r4:854f2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f2b8c r4:854d2400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8552ec00 r8:854d242c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2400 r8:80287e08 r7:eb1fde60 r6:854d2480 r5:8552ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb209fb0 to 0xeb209ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d0bc0
INFO: task kworker/1:579:4832 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r5:80070113 r4:80239bb0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:8530a300
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r5:84ace000 r4:8291a680
r5:00001000 r4:eaf41000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d3b40
INFO: task kworker/0:273:4835 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d4b33000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84b6838c r4:84b68000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84ac8c00 r8:854dddac r7:82804d40 r6:dddced80 r5:dddceda0
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d3b40
INFO: task kworker/0:274:4836 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d4e44000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:580:4838 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:580 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb235d84 r8:00000002 r7:60000013 r6:eb235d8c r5:85450000
r4:85450000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85450000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f8b8c r4:854f8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f8b8c r4:854d2500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85450000 r8:854d252c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2500 r8:80287e08 r7:eb209e60 r6:854dde80 r5:85450000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb235fb0 to 0xeb235ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d0f80
INFO: task kworker/1:580:4838 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d4e44000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:581:4839 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:581 state:D stack:0 pid:4839 tgid:4839 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb241d84 r8:00000002 r7:60000113 r6:eb241d8c r5:85450c00
r4:85450c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85450c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead91000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f2f8c r4:854f2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f2f8c r4:854d2580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85450c00 r8:854d25ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2580 r8:80287e08 r7:eb235e60 r6:854ddf00 r5:85450c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb241fb0 to 0xeb241ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c5000
INFO: task kworker/1:581:4839 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
Exception stack(0xeae7dd28 to 0xeae7dd70)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8291a684 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:85451800
r5:85451800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85451800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f378c r4:854f3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f378c r4:854d2680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85451800 r8:854d26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2680 r8:80287e08 r7:eb235e60 r6:854ddf80 r5:85451800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb265fb0 to 0xeb265ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c53c0
INFO: task kworker/1:582:4842 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d5356000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:583:4843 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:583 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb27dd84 r8:00000002 r7:60000013 r6:eb27dd8c r5:85452400
r4:85452400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85452400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85452400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaec1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f3b8c r4:854f3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f3b8c r4:854d2700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85452400 r8:854d272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2700 r8:80287e08 r7:eb235e60 r6:854d7000 r5:85452400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb27dfb0 to 0xeb27dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c5280
INFO: task kworker/1:583:4843 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d5779000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:584:4845 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:584 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb229d84 r8:00000002 r7:60000113 r6:eb229d8c r5:85529800
r4:85529800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85529800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85529800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf0d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f3f8c r4:854f3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f3f8c r4:854d2780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85529800 r8:854d27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2780 r8:80287e08 r7:eb235e60 r6:854d2800 r5:85529800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb229fb0 to 0xeb229ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c5280
INFO: task kworker/1:584:4845 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d5779000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:585:4848 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:585 state:D stack:0 pid:4848 tgid:4848 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb28dd84 r8:00000002 r7:60000113 r6:eb28dd8c r5:8552e000
r4:8552e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8552e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb28de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5b80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8552e000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb007000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f838c r4:854f8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f838c r4:854d2880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8552e000 r8:854d28ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2880 r8:80287e08 r7:eb235e60 r6:854d2900 r5:8552e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb28dfb0 to 0xeb28dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c5280
INFO: task kworker/1:585:4848 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d5779000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:275:4849 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:275 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2a1d84 r8:00000002 r7:60000113 r6:eb2a1d8c r5:85458000
r4:85458000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85458000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5c80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85458000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb061000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f878c r4:854f8400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854f878c r4:854d7080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85458000 r8:854d70ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854d7080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d7080 r8:80287e08 r7:eb32de60 r6:854d2980 r5:85458000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2a1fb0 to 0xeb2a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d5100
INFO: task kworker/0:275:4849 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d5fb5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:276:4851 blocked for more than 458 seconds.
Workqueue: events bpf_prog_free_deferred
r10:8291a684 r9:eb2a9d84 r8:00000002 r7:60000113 r6:eb2a9d8c r5:85458c00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r4:00000000
r5:00001000 r4:eb3e7000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541878c r4:85418400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541878c r4:854d7100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85458c00 r8:854d712c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854d7100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d7100 r8:80287e08 r7:eb2a1e60 r6:854d2a00 r5:85458c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2a9fb0 to 0xeb2a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d5100
INFO: task kworker/0:276:4851 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d5fb5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:586:4853 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:586 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2bdd84 r8:00000002 r7:60000113 r6:eb2bdd8c r5:8545a400
r4:8545a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c53c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8545a400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f8f8c r4:854f8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f8f8c r4:854d2a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545a400 r8:854d2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2a80 r8:80287e08 r7:eb235e60 r6:854d2b00 r5:8545a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2bdfb0 to 0xeb2bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c5bc0
INFO: task kworker/1:586:4853 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d62b5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:277:4854 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:277 state:D stack:0 pid:4854 tgid:4854 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2c9d84 r8:00000002 r7:60000113 r6:eb2c9d8c r5:8545b000
r4:8545b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5bc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8545b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541838c r4:85418000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541838c r4:854d7180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545b000 r8:854d71ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854d7180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d7180 r8:80287e08 r7:eb2a9e60 r6:854d2b80 r5:8545b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2c9fb0 to 0xeb2c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d5100
INFO: task kworker/0:277:4854 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d64e1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:587:4858 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:587 state:D stack:0 pid:4858 tgid:4858 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb271d84 r8:00000002 r7:60000113 r6:eb271d8c r5:8545c800
r4:8545c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0a80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8545c800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb211000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f938c r4:854f9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f938c r4:854d2c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545c800 r8:854d2c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2c00 r8:80287e08 r7:eb2bde60 r6:854d2c80 r5:8545c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb271fb0 to 0xeb271ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c5f40
INFO: task kworker/1:587:4858 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d6759000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:588:4859 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:588 state:D stack:0 pid:4859 tgid:4859 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3a1d84 r8:00000002 r7:60000113 r6:eb3a1d8c r5:8545d400
r4:8545d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c0280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8545d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb255000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f9b8c r4:854f9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f9b8c r4:854d2d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545d400 r8:854d2d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2d00 r8:80287e08 r7:eb271e60 r6:854d2d80 r5:8545d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3a1fb0 to 0xeb3a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d0e00
INFO: task kworker/1:588:4859 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d69ea000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:589:4861 blocked for more than 458 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:589 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:85455400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
r5:00001000 r4:eb225000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfa0: 00000000 00000000 00000000 00000000
Call trace:
dd20: d6ced000 df9c1000 00000001 80239b98 7f3cb000 00000001
r4:eae7ddc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530e480
Workqueue: events bpf_prog_free_deferred
r5:85454800 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c03c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85454800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb289000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854f9f8c r4:854f9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854f9f8c r4:854d2e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85454800 r8:854d2eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2e80 r8:80287e08 r7:eb3a1e60 r6:854d7280 r5:85454800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3b9fb0 to 0xeb3b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c0100
INFO: task kworker/1:590:4865 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d6dfb000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:591:4866 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:591 state:D stack:0 pid:4866 tgid:4866 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8291a684 r9:eb3bdd84 r8:00000002 r7:60000013 r6:eb3bdd8c r5:85456000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb2a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d80 r6:83018200 r5:854fa38c r4:854d2f00
Exception stack(0xeb3bdfb0 to 0xeb3bdff8)
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:80070113 r4:80239bb0
r4:eae7ddc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8291a684 r9:eb3c1d84 r8:00000002 r7:60000013 r6:eb3c1d8c r5:85456c00
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb3a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854fa78c r4:854fa400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854fa78c r4:854d2f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85456c00 r8:854d2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854d2f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d2f80 r8:80287e08 r7:eb3bde60 r6:854d7380 r5:85456c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3c1fb0 to 0xeb3c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c0440
INFO: task kworker/1:592:4868 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d7705000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:593:4870 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:593 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3c9d84 r8:00000002 r7:60000013 r6:eb3c9d8c r5:85453c00
r4:85453c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85453c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb3cb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:ddde2d80 r6:83018200 r5:84772b8c r4:8551c000
r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:00000000
r5:80070113 r4:80239bb0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:85cd538c r4:85cd5000
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:594:4872 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:594 state:D stack:0 pid:4872 tgid:4872 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3b5d84 r8:00000002 r7:60000113 r6:eb3b5d8c r5:8545e000
r4:8545e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8545e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb42d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854fbb8c r4:854fb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854fbb8c r4:8551c080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545e000 r8:8551c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551c080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551c080 r8:80287e08 r7:eb3c9e60 r6:8551c100 r5:8545e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3b5fb0 to 0xeb3b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c0440
INFO: task kworker/1:594:4872 is blocked on a mutex likely owned by task kworker/1:417:4402.
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb3db000
r5:854fab8c r4:854fa800
r4:8551c180
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dd20: d83a0000 df9c1000 00000001 80239b98 7f3cb000 00000001
r5:00001000 r4:ed8b3000
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:278:4876 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:278 state:D stack:0 pid:4876 tgid:4876 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3f5d84 r8:00000002 r7:60000113 r6:eb3f5d8c r5:8552b000
r4:8552b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8552b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5e40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8552b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85418b8c r4:85418800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85418b8c r4:854d7480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8552b000 r8:854d74ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854d7480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d7480 r8:80287e08 r7:eb2a9e60 r6:8551c280 r5:8552b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3f5fb0 to 0xeb3f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d5ac0
INFO: task kworker/0:278:4876 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d87ef000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:596:4878 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:596 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3f9d84 r8:00000002 r7:60000013 r6:eb3f9d8c r5:85528c00
r4:85528c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85528c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08
r4:00000000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r9:83018205 r8:85528c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
r5:00001000 r4:eb40f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854faf8c r4:854fac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854faf8c r4:8551c300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb3f9fb0 to 0xeb3f9ff8)
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:279:4880 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:279 state:D stack:0 pid:4880 tgid:4880 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb409d84 r8:00000002 r7:60000113 r6:eb409d8c r5:85590000
r4:85590000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85590000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb409e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f340
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85590000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb483000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541938c r4:85419000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541938c r4:854d7500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:854d7500 r8:80287e08 r7:eb3f5e60 r6:8551c400 r5:85590000
r4:854d5c40
Workqueue: events bpf_prog_free_deferred
r4:00000000
r4:82ac21e4
r5:00001000 r4:ed8b3000
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:280:4881 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:280 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb40dd84 r8:00000002 r7:60000113 r6:eb40dd8c r5:85590c00
r4:85590c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85590c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f240
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85590c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb47b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85418f8c r4:85418c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85418f8c r4:854d7580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85590c00 r8:854d75ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854d7580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
dd60: 80230ad0 80239bb0 80070113 ffffffff
r4:eae7ddc0
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r5:85593000 r4:8291a680
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb417000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:85593000 r8:8551c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
Exception stack(0xeae7dd28 to 0xeae7dd70)
r4:82ac21e4
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
r4:8530a300
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:598:4885 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:598 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3b1d84 r8:00000002 r7:60000113 r6:eb3b1d8c r5:85453000
r4:85453000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85453000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85453000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb423000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854fb78c r4:854fb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854fb78c r4:8551c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85453000 r8:8551c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551c580 r8:80287e08 r7:eb3b5e60 r6:854d7680 r5:85453000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3b1fb0 to 0xeb3b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c0c00
INFO: task kworker/1:598:4885 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d9a98000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:599:4888 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:599 state:D stack:0 pid:4888 tgid:4888 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb43dd84 r8:00000002 r7:60000113 r6:eb43dd8c r5:84701800
r4:84701800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84701800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7240
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84701800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb435000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854fbf8c r4:854fbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854fbf8c r4:8551c600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84701800 r8:8551c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551c600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551c600 r8:80287e08 r7:eb3b5e60 r6:854d7700 r5:84701800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb43dfb0 to 0xeb43dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d9b73000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:600 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08
r9:83018205 r8:84700c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
r5:00001000 r4:e00b5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550538c r4:85505000
r7:ddde2d80 r6:83018200 r5:8550538c r4:8551c680
r4:8551c680
Exception stack(0xeb44dfb0 to 0xeb44dff8)
r4:854c7180
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: d9ee5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:601:4892 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:601 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb45dd84 r8:00000002 r7:60000113 r6:eb45dd8c r5:84703000
r4:84703000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84703000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550438c r4:85504000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550438c r4:8551c700
r10:61c88647 r9:84703000 r8:8551c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c7380
INFO: task kworker/1:601:4892 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: da064000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:602:4894 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:602 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb46dd84 r8:00000002 r7:60000113 r6:eb46dd8c r5:84702400
r4:84702400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84702400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84702400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb455000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550478c r4:85504400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550478c r4:8551c780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84702400 r8:8551c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
dd20: da46d000 df9c1000 00000001 80239b98 7f3cb000 00000001
r4:eae7ddc0
r5:00001000 r4:ed8b3000
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:603 state:D stack:0 pid:4895 tgid:4895 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d80 r6:83018200 r5:85504b8c r4:8551c800
r10:00000000 r9:8551c800 r8:80287e08 r7:eb44de60 r6:854d7900 r5:84700000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:281:4898 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:281 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb405d84 r8:00000002 r7:60000113 r6:eb405d8c r5:84704800
r4:84704800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84704800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f4c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84704800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb48b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541978c r4:85419400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541978c r4:854d7980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84704800 r8:854d79ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854d7980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d7980 r8:80287e08 r7:eb409e60 r6:854d7a00 r5:84704800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb405fb0 to 0xeb405ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8551f140
INFO: task kworker/0:281:4898 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: da720000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:282:4900 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:282 state:D stack:0 pid:4900 tgid:4900 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3e5d84 r8:00000002 r7:60000113 r6:eb3e5d8c r5:84705400
r4:84705400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84705400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f880
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84705400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa83000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85419f8c r4:85419c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85419f8c r4:854d7a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84705400 r8:854d7aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854d7a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d7a80 r8:80287e08 r7:eb405e60 r6:854d7b00 r5:84705400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3e5fb0 to 0xeb3e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8551f2c0
INFO: task kworker/0:282:4900 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: dabc1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:283:4902 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:283 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:84706000
r4:84706000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84706000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84706000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541a38c r4:8541a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541a38c r4:854d7b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84706000 r8:854d7bac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854d7b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d7b80 r8:80287e08 r7:eb3e5e60 r6:854d7c00 r5:84706000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb469fb0 to 0xeb469ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8551f2c0
INFO: task kworker/0:283:4902 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: dadae000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:604:4903 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:604 state:D stack:0 pid:4903 tgid:4903 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb349d84 r8:00000002 r7:60000113 r6:eb349d8c r5:84706c00
r4:84706c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84706c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7c00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84706c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85504f8c r4:85504c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85504f8c r4:8551c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84706c00 r8:8551c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551c880 r8:80287e08 r7:eb44de60 r6:854d7c80 r5:84706c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb349fb0 to 0xeb349ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c7600
INFO: task kworker/1:604:4903 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: db502000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/0:284 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:84703c00
r4:84703c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84703c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84703c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb575000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541af8c r4:8541ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541af8c r4:854d7d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84703c00 r8:854d7d2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854d7d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854d7d00 r8:80287e08 r7:eb469e60 r6:854d7d80 r5:84703c00
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
dd20: db7ef000 df9c1000 00000001 80239b98 7f3cb000 00000001
r4:eae7ddc0
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:285:4907 blocked for more than 459 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:285 state:D stack:0 pid:4907 tgid:4907 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb34dd84 r8:00000002 r7:60000013 r6:eb34dd8c r5:84a20000
r4:84a20000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a20000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84a20000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541a78c r4:8541a400
r7:dddced80 r6:83018000 r5:8541a78c r4:854d7e00
r10:00000000 r9:854d7e00 r8:80287e08 r7:eb495e60 r6:854d7e80 r5:84a20000
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:605:4911 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:605 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4a1d84 r8:00000002 r7:60000013 r6:eb4a1d8c r5:84a21800
r4:84a21800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a21800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a21800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05d9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550578c r4:85505400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550578c r4:8551c900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a21800 r8:8551c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551c900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551c900 r8:80287e08 r7:eb44de60 r6:854d7f00 r5:84a21800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4a1fb0 to 0xeb4a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c7b00
INFO: task kworker/1:605:4911 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r4:00000000
dd20: dbace000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:606:4913 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:606 state:D stack:0 pid:4913 tgid:4913 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4a9d84 r8:00000002 r7:60000013 r6:eb4a9d8c r5:84a23000
r4:84a23000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a23000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7f40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a23000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e069d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85505b8c r4:85505800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85505b8c r4:8551c980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a23000 r8:8551c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551c980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551c980 r8:80287e08 r7:eb4a1e60 r6:854d7f80 r5:84a23000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4a9fb0 to 0xeb4a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c7d80
INFO: task kworker/1:606:4913 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: dbed6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:607:4916 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:607 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:84a22400
r4:84a22400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a22400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a22400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e07a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85505f8c r4:85505c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85505f8c r4:8551ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a22400 r8:8551ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551ca00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551ca00 r8:80287e08 r7:eb4a9e60 r6:8551e000 r5:84a22400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b5fb0 to 0xeb4b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c7dc0
INFO: task kworker/1:607:4916 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: dc154000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:608:4917 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:608 state:D stack:0 pid:4917 tgid:4917 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb499d84 r8:00000002 r7:60000113 r6:eb499d8c r5:85591800
r4:85591800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85591800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb499e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85591800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85506f8c r4:85506c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85506f8c r4:8551ca80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85591800 r8:8551caac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551ca80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551ca80 r8:80287e08 r7:eb4b5e60 r6:8551cb00 r5:85591800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb499fb0 to 0xeb499ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c7e80
INFO: task kworker/1:608:4917 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: dc399000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:609:4919 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:609 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000113 r6:eb4b1d8c r5:85594800
r4:85594800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85594800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85594800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0825000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550638c r4:85506000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550638c r4:8551cb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85594800 r8:8551cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551cb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551cb80 r8:80287e08 r7:eb499e60 r6:8551cc00 r5:85594800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b1fb0 to 0xeb4b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854c7940
INFO: task kworker/1:609:4919 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: dc81c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:610:4921 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:610 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:85595400
r4:85595400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85595400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85595400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0949000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550678c r4:85506400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550678c r4:8551cc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85595400 r8:8551ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551cc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551cc80 r8:80287e08 r7:eb499e60 r6:8551cd00 r5:85595400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b9fb0 to 0xeb4b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d5200
INFO: task kworker/1:610:4921 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: dce4d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:611:4922 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:611 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:85596000
r4:85596000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85596000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df180
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85596000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac29000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85506b8c r4:85506800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85506b8c r4:8551cd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85596000 r8:8551cdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551cd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551cd80 r8:80287e08 r7:eb499e60 r6:8551ce00 r5:85596000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb49dfb0 to 0xeb49dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854d5200
INFO: task kworker/1:611:4922 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
dd20: dce4d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:612:4925 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:612 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000013 r6:eb4bdd8c r5:85596c00
r4:85596c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85596c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85596c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac89000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550738c r4:85507000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550738c r4:8551ce80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85596c00 r8:8551ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551ce80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551ce80 r8:80287e08 r7:eb499e60 r6:8551cf00 r5:85596c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4bdfb0 to 0xeb4bdff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd60: 80230ad0 80239bb0 80070113 ffffffff
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:00000000
r5:00001000 r4:ed8b3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:8530a300
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:8530e480
Not tainted 6.15.0-rc7-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:84a20c00
r4:84a20c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a20c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaced000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550778c r4:85507400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550778c r4:8551cf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a20c00 r8:8551cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8551cf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551cf80 r8:80287e08 r7:eb4bde60 r6:8551e080 r5:84a20c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4cdfb0 to 0xeb4cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854df080
INFO: task kworker/1:613:4927 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: dd764000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:614:4929 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:614 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000013 r6:eb4d5d8c r5:84a25400
r4:84a25400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a25400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dfbc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a25400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0bb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85508b8c r4:85508800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85508b8c r4:8555b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a25400 r8:8555b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b000 r8:80287e08 r7:eb4cde60 r6:8551e100 r5:84a25400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4d5fb0 to 0xeb4d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854df080
INFO: task kworker/1:614:4929 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: de4a6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:615:4930 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:615 state:D stack:0 pid:4930 tgid:4930 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4d9d84 r8:00000002 r7:60000113 r6:eb4d9d8c r5:84a23c00
r4:84a23c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a23c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df6c0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d80 r6:83018200 r5:85507b8c r4:8555b080
r10:00000000 r9:8555b080 r8:80287e08 r7:eb4d5e60 r6:8551e180 r5:84a23c00
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
dd60: 80230ad0 80239bb0 80070113 ffffffff
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:8530a300
Exception stack(0xeae7dfb0 to 0xeae7dff8)
Not tainted 6.15.0-rc7-syzkaller #0
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df800
r7:ddde2d80 r6:83018200 r5:85507f8c r4:8555b100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b20000 r8:8555b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b100 r8:80287e08 r7:eb4d5e60 r6:8551e200 r5:84b20000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4e5fb0 to 0xeb4e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854df540
INFO: task kworker/1:616:4933 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: ded3c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:617:4935 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:617 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4edd84 r8:00000002 r7:60000113 r6:eb4edd8c r5:84b21800
r4:84b21800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b21800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:854df680
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
dd20: defb0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
Not tainted 6.15.0-rc7-syzkaller #0
r4:84b22400
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dfa80
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:ddde2d80 r6:83018200 r5:8550878c r4:8555b200
r10:00000000 r9:8555b200 r8:80287e08 r7:eb4d5e60 r6:8551e300 r5:84b22400
r4:854df680
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r5:00001000 r4:ed8b3000
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Not tainted 6.15.0-rc7-syzkaller #0
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r7:ddde2d80 r6:83018200 r5:85508f8c r4:8555b280
r10:61c88647 r9:84b20c00 r8:8555b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b280 r8:80287e08 r7:eb4d5e60 r6:8551e380 r5:84b20c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb509fb0 to 0xeb509ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854df900
INFO: task kworker/1:619:4939 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: df6eb000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:620:4941 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:620 state:D stack:0 pid:4941 tgid:4941 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb511d84 r8:00000002 r7:60000013 r6:eb511d8c r5:84b24800
r4:84b24800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b24800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dff80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b24800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb119000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550978c r4:85509400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550978c r4:8555b300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b24800 r8:8555b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b300 r8:80287e08 r7:eb509e60 r6:8551e400 r5:84b24800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb511fb0 to 0xeb511ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854dfb40
INFO: task kworker/1:620:4941 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417 state:R running task stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20: df9ba000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
r4:00000000
r5:00001000 r4:ed8b3000
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84b23c00
r4:00000000
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:84b23c00 r8:8555b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fa0: 00000000 00000000 00000000 00000000
r4:854dfb40
Workqueue: events bpf_prog_free_deferred
r4:83a7bc00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ed8f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85cd578c r4:85cd5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85cd578c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:622:4944 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:622 state:D stack:0 pid:4944 tgid:4944 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb51dd84 r8:00000002 r7:60000113 r6:eb51dd8c r5:84b23000
r4:84b23000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b23000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08
r4:00000000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:8550a38c r4:8550a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550a38c r4:8555b400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:8555b400 r8:80287e08 r7:eb511e60 r6:8551e500 r5:84b23000
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 90070113 ffffffff
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:623 state:D stack:0 pid:4946 tgid:4946 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08
r5:85509b8c r4:85509800
r7:ddde2d80 r6:83018200 r5:85509b8c r4:8555b480
r4:8555b480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b480 r8:80287e08 r7:eb51de60 r6:8551e580 r5:84b25400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb525fb0 to 0xeb525ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8551fdc0
INFO: task kworker/1:623:4946 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 7f8b1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 90070113 ffffffff
r5:90070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:624:4947 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:624 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb529d84 r8:00000002 r7:60000113 r6:eb529d8c r5:84b26c00
r4:84b26c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b26c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556f140
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb343000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85509f8c r4:85509c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85509f8c r4:8555b500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b26c00 r8:8555b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b500 r8:80287e08 r7:eb51de60 r6:8551e600 r5:84b26c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb529fb0 to 0xeb529ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854dfd80
INFO: task kworker/1:624:4947 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 7fcbb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:286:4950 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:286 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4c5d84 r8:00000002 r7:60000113 r6:eb4c5d8c r5:84b26000
r4:84b26000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b26000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561a00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84b26000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb30b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541ab8c r4:8541a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541ab8c r4:8551e680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b26000 r8:8551e6ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8551e680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551e680 r8:80287e08 r7:eb495e60 r6:8551e700 r5:84b26000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4c5fb0 to 0xeb4c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85561c40
INFO: task kworker/0:286:4950 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 80463000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:287:4953 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:287 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4c1d84 r8:00000002 r7:60000013 r6:eb4c1d8c r5:84a26c00
r4:84a26c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a26c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84a26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb57d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541b38c r4:8541b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541b38c r4:8551e780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a26c00 r8:8551e7ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8551e780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551e780 r8:80287e08 r7:eb495e60 r6:8551e800 r5:84a26c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4c1fb0 to 0xeb4c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85561bc0
INFO: task kworker/0:287:4953 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 80463000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:625:4955 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:625 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb551d84 r8:00000002 r7:60000013 r6:eb551d8c r5:84a26000
r4:84a26000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84a26000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556f440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84a26000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb371000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550a78c r4:8550a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550a78c r4:8555b580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a26000 r8:8555b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b580 r8:80287e08 r7:eb51de60 r6:8551e880 r5:84a26000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb551fb0 to 0xeb551ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556f180
INFO: task kworker/1:625:4955 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 80519000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:626:4957 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:626 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:85548000
r4:85548000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85548000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556f500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85548000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb37f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550ab8c r4:8550a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550ab8c r4:8555b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85548000 r8:8555b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b600 r8:80287e08 r7:eb551e60 r6:8551e900 r5:85548000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb559fb0 to 0xeb559ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556f240
INFO: task kworker/1:626:4957 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 80a8e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:627:4959 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:627 state:D stack:0 pid:4959 tgid:4959 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb569d84 r8:00000002 r7:60000113 r6:eb569d8c r5:85549800
r4:85549800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85549800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556f680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85549800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb549000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550af8c r4:8550ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550af8c r4:8555b680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85549800 r8:8555b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b680 r8:80287e08 r7:eb559e60 r6:8551e980 r5:85549800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb569fb0 to 0xeb569ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556f3c0
INFO: task kworker/1:627:4959 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 80d88000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:628:4960 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:628 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb52dd84 r8:00000002 r7:60000113 r6:eb52dd8c r5:85592400
r4:85592400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85592400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556fc00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85592400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0179000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550b78c r4:8550b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550b78c r4:8555b700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85592400 r8:8555b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b700 r8:80287e08 r7:eb569e60 r6:8555b780 r5:85592400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb52dfb0 to 0xeb52dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556f3c0
INFO: task kworker/1:628:4960 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 80d88000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:629:4962 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:629 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb555d84 r8:00000002 r7:60000113 r6:eb555d8c r5:85593c00
r4:85593c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85593c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556f880
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85593c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb565000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550b38c r4:8550b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550b38c r4:8555b800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85593c00 r8:8555b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b800 r8:80287e08 r7:eb52de60 r6:8555b880 r5:85593c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb555fb0 to 0xeb555ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556f3c0
INFO: task kworker/1:629:4962 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 815b2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:630:4964 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:630 state:D stack:0 pid:4964 tgid:4964 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:85459800
r4:85459800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85459800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85459800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae11000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550c38c r4:8550c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550c38c r4:8555b900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85459800 r8:8555b92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555b900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555b900 r8:80287e08 r7:eb52de60 r6:8555b980 r5:85459800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb581fb0 to 0xeb581ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556f780
INFO: task kworker/1:630:4964 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 815b2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:288:4966 blocked for more than 460 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:288 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb56dd84 r8:00000002 r7:60000113 r6:eb56dd8c r5:85548c00
r4:85548c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85548c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85548c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb58d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541b78c r4:8541b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541b78c r4:8551ea00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85548c00 r8:8551ea2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8551ea00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551ea00 r8:80287e08 r7:eb4c1e60 r6:8551ea80 r5:85548c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb56dfb0 to 0xeb56dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85577100
INFO: task kworker/0:288:4966 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 81b98000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:289:4968 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:289 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb591d84 r8:00000002 r7:60000113 r6:eb591d8c r5:8554b000
r4:8554b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8554b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8554b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb599000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541bb8c r4:8541b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541bb8c r4:8551eb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8554b000 r8:8551eb2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8551eb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551eb00 r8:80287e08 r7:eb56de60 r6:8551eb80 r5:8554b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb591fb0 to 0xeb591ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85577200
INFO: task kworker/0:289:4968 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 81b98000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:290:4970 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:290 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:8554bc00
r4:8554bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8554bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577cc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8554bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e08fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855d078c r4:855d0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d078c r4:8551ec00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8554bc00 r8:8551ec2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8551ec00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551ec00 r8:80287e08 r7:eb591e60 r6:8551ec80 r5:8554bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb59dfb0 to 0xeb59dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85577380
INFO: task kworker/0:290:4970 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 81e7c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:291:4972 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:291 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:8554c800
r4:8554c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8554c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577700
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8554c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8541bf8c r4:8541bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8541bf8c r4:8551ed00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8554c800 r8:8551ed2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8551ed00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551ed00 r8:80287e08 r7:eb59de60 r6:8551ed80 r5:8554c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5a9fb0 to 0xeb5a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85577500
INFO: task kworker/0:291:4972 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 823d1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:292:4976 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:292 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:8554d400
r4:8554d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8554d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8554d400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffb5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84b6878c r4:84b68400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b6878c r4:8551ee00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8554d400 r8:8551ee2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8551ee00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551ee00 r8:80287e08 r7:eb59de60 r6:8551ee80 r5:8554d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b5fb0 to 0xeb5b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85577780
INFO: task kworker/0:292:4976 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 823d1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:293:4977 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:293 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb585d84 r8:00000002 r7:60000113 r6:eb585d8c r5:8554e000
r4:8554e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8554e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577b80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8554e000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0201000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855d038c r4:855d0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d038c r4:8551ef00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8554e000 r8:8551ef2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8551ef00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8551ef00 r8:80287e08 r7:eb59de60 r6:8551ef80 r5:8554e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb585fb0 to 0xeb585ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85577780
INFO: task kworker/0:293:4977 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 82c3a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:631:4979 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:631 state:D stack:0 pid:4979 tgid:4979 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:85598000
r4:85598000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85598000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d180
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85598000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab23000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550bb8c r4:8550b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550bb8c r4:8555ba00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85598000 r8:8555ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555ba00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555ba00 r8:80287e08 r7:eb581e60 r6:8555ba80 r5:85598000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb29dfb0 to 0xeb29dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556fe00
INFO: task kworker/1:631:4979 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 82f6d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:294:4981 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:294 state:D stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:8559a400
r4:8559a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8559a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8559a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaad7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855d0b8c r4:855d0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d0b8c r4:8556b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8559a400 r8:8556b02c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8556b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8556b000 r8:80287e08 r7:eb59de60 r6:8555bb00 r5:8559a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3e1fb0 to 0xeb3e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85577b40
INFO: task kworker/0:294:4981 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 83095000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:295:4983 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:295 state:D stack:0 pid:4983 tgid:4983 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb291d84 r8:00000002 r7:60000113 r6:eb291d8c r5:8554ec00
r4:8554ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8554ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb291e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85606280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8554ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfac7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855d2b8c r4:855d2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d2b8c r4:8556b080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8554ec00 r8:8556b0ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8556b080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8556b080 r8:80287e08 r7:eb3e1e60 r6:8556b100 r5:8554ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb291fb0 to 0xeb291ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85577c80
INFO: task kworker/0:295:4983 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r5:80070113 r4:80239bb0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:296:4984 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:296 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:8554a400
r4:8554a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8554a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8554a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb66b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855d0f8c r4:855d0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d0f8c r4:8556b180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8554a400 r8:8556b1ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8556b180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8556b180 r8:80287e08 r7:eb291e60 r6:8556b200 r5:8554a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3c5fb0 to 0xeb3c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85577c80
INFO: task kworker/0:296:4984 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 83962000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:632:4987 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:632 state:D stack:0 pid:4987 tgid:4987 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r4:85550000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d2c0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550bf8c r4:8550bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550bf8c r4:8555bb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85550000 r8:8555bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555bb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555bb80 r8:80287e08 r7:eb581e60 r6:8556b280 r5:85550000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb401fb0 to 0xeb401ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555d240
INFO: task kworker/1:632:4987 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 83962000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
INFO: task kworker/1:633:4990 blocked for more than 461 seconds.
r4:85550c00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d900
r5:8550d38c r4:8550d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550d38c r4:8555bc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85550c00 r8:8555bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555bc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555bc00 r8:80287e08 r7:eb581e60 r6:8556b300 r5:85550c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb491fb0 to 0xeb491ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555d240
INFO: task kworker/1:633:4990 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 83bb8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:634:4992 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:634 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5bdd84 r8:00000002 r7:60000113 r6:eb5bdd8c r5:85553000
r4:85553000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85553000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85553000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaeb1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550c78c r4:8550c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550c78c r4:8555bc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85553000 r8:8555bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555bc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555bc80 r8:80287e08 r7:eb491e60 r6:8556b380 r5:85553000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5bdfb0 to 0xeb5bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555d240
INFO: task kworker/1:634:4992 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 83cf0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:635:4993 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:635 state:D stack:0 pid:4993 tgid:4993 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r4:85553c00
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85553c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaeff000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550cb8c r4:8550c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550cb8c r4:8555bd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85553c00 r8:8555bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555bd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555bd00 r8:80287e08 r7:eb491e60 r6:8556b400 r5:85553c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c1fb0 to 0xeb5c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555d3c0
INFO: task kworker/1:635:4993 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 842a5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:636:4995 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:636 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3edd84 r8:00000002 r7:60000113 r6:eb3edd8c r5:85598c00
r4:85598c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85598c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8550cf8c r4:8550cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550cf8c r4:8555bd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85598c00 r8:8555bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555bd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555bd80 r8:80287e08 r7:eb491e60 r6:8555be00 r5:85598c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xeaf29d28 to 0xeaf29d70)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:637:4998 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:637 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:8559b000
r4:8559b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8559b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555dbc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8559b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb18b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550db8c r4:8550d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550db8c r4:8555be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8559b000 r8:8555beac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8555be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8555be80 r8:80287e08 r7:eb491e60 r6:8555bf00 r5:8559b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c5fb0 to 0xeb5c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555d780
INFO: task kworker/1:637:4998 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 848a6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:638:4999 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:638 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:85552400
r4:85552400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85552400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555db00
r4:00000000
r9:83018205 r8:85552400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r5:8550d78c r4:8550d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85552400 r8:8555bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeb5d1fb0 to 0xeb5d1ff8)
INFO: task kworker/1:638:4999 is blocked on a mutex likely owned by task kworker/1:426:4465.
r5:80070113 r4:80239bb0
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8550f38c r4:8550f000
r10:61c88647 r9:85555400 r8:8557202c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572000 r8:80287e08 r7:eb5c5e60 r6:8556b500 r5:85555400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5ddfb0 to 0xeb5ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555db80
INFO: task kworker/1:639:5002 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 85263000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:640:5004 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:640 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5e5d84 r8:00000002 r7:60000013 r6:eb5e5d8c r5:85554800
r4:85554800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85554800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555dd40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85554800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb205000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550df8c r4:8550dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550df8c r4:85572080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85554800 r8:855720ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572080 r8:80287e08 r7:eb5dde60 r6:8556b580 r5:85554800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5e5fb0 to 0xeb5e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555db80
INFO: task kworker/1:640:5004 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 85604000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:852cfa40
r4:85551800
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:8550e38c r4:8550e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85551800 r8:8557212c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:82ac21e4
r5:00001000 r4:dfd17000
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:85556000
r4:85556000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85556000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555dfc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85556000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb259000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550e78c r4:8550e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550e78c r4:85572180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85556000 r8:855721ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572180 r8:80287e08 r7:eb5dde60 r6:8556b680 r5:85556000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5f5fb0 to 0xeb5f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555dd00
INFO: task kworker/1:642:5008 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 85a2a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:643:5009 blocked for more than 461 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556ff80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85556c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb299000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550eb8c r4:8550e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550eb8c r4:85572200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85556c00 r8:8557222c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572200 r8:80287e08 r7:eb5dde60 r6:8556b700 r5:85556c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5f9fb0 to 0xeb5f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555de40
INFO: task kworker/1:643:5009 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 85eca000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:644:5011 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:644 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:85608c00
r4:85608c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85608c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577e80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85608c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb39c000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550ef8c r4:8550ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550ef8c r4:85572280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85608c00 r8:855722ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572280 r8:80287e08 r7:eb5dde60 r6:8556b780 r5:85608c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb601fb0 to 0xeb601ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85577ec0
INFO: task kworker/1:644:5011 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 862de000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:645:5013 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
task:kworker/1:645 state:D stack:0 pid:5013 tgid:5013 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08
r5:00001000 r4:eb3e9000
r5:8550f78c r4:8550f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
Exception stack(0xeaf29d28 to 0xeaf29d70)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:646:5015 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:646 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:85609800
r4:85609800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85609800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85609800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb429000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8550ff8c r4:8550fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550ff8c r4:85572380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85609800 r8:855723ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572380 r8:80287e08 r7:eb609e60 r6:8556b880 r5:85609800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb611fb0 to 0xeb611ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8557f000
INFO: task kworker/1:646:5015 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 86ab6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:647:5017 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:647 state:D stack:0 pid:5017 tgid:5017 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb619d84 r8:00000002 r7:60000013 r6:eb619d8c r5:8560a400
r4:8560a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8560a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r9:83018205 r8:8560a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
r5:8550fb8c r4:8550f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8550fb8c r4:85572400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:85572400
r10:00000000 r9:85572400 r8:80287e08 r7:eb611e60 r6:8556b900 r5:8560a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb619fb0 to 0xeb619ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8557f180
INFO: task kworker/1:647:5017 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 86d96000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:648:5020 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:648 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:8560c800
r4:8560c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8560c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f7c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8560c800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb449000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8551078c r4:85510400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8551078c r4:85572480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8560c800 r8:855724ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572480 r8:80287e08 r7:eb611e60 r6:8556b980 r5:8560c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb625fb0 to 0xeb625ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8557f200
INFO: task kworker/1:648:5020 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 86f1d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:649:5021 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:649 state:D stack:0 pid:5021 tgid:5021 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:8560bc00
r4:8560bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8560bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f6c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8560bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb437000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8551038c r4:85510000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8551038c r4:85572500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8560bc00 r8:8557252c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572500 r8:80287e08 r7:eb625e60 r6:8556ba00 r5:8560bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb629fb0 to 0xeb629ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8557f600
INFO: task kworker/1:649:5021 is blocked on a mutex likely owned by task kworker/1:426:4465.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8700d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/1:650 state:D stack:0 pid:5024 tgid:5024 ppid:2 task_flags:0x4208060 flags:0x00000000
r9:83018205 r8:8560b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
r5:8551138c r4:85511000
r7:ddde2d80 r6:83018200 r5:8551138c r4:85572580
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 877c1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r5:852bd78c r4:852bd400
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:85510b8c r4:85510800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:85572600
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:652:5027 blocked for more than 461 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:652 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:8560e000
r4:8560e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8560e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08
r4:00000000
r5:85510f8c r4:85510c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:85572680
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r5:80070113 r4:80239bb0
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8551178c r4:85511400
r10:61c88647 r9:84ab8000 r8:8557272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
INFO: task kworker/1:654:5032 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:654 state:D stack:0 pid:5032 tgid:5032 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb651d84 r8:00000002 r7:60000113 r6:eb651d8c r5:84ab8c00
r4:84ab8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ab8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557fe40
r5:85511b8c r4:85511800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r4:852cfa40
r5:84ab9800 r4:8291a680
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589a40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ab9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6b7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85512f8c r4:85512c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85512f8c r4:85572800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:85572800
Exception stack(0xeb65dfb0 to 0xeb65dff8)
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:82ac21e4
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:656:5035 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f940
r5:85511f8c r4:85511c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85511f8c r4:85572880
r10:61c88647 r9:84aba400 r8:855728ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8832c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8551238c r4:85512000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb639fb0 to 0xeb639ff8)
INFO: task kworker/1:657:5037 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8885c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:297:5039 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:297 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb67dd84 r8:00000002 r7:60000113 r6:eb67dd8c r5:8559d400
r4:8559d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8559d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856445c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8559d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb68b000
r5:855d138c r4:855d1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d138c r4:8556be00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:8556be00 r8:80287e08 r7:eb291e60 r6:85572a00 r5:8559d400
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb67dfb0 to 0xeb67dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85644300
INFO: task kworker/0:297:5039 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 88953000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r5:852bd78c r4:852bd400
r4:8530ac00
r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:658 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589040
r5:8551278c r4:85512400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8551278c r4:85572a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8559e000 r8:85572aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572a80 r8:80287e08 r7:eb65de60 r6:85572b00 r5:8559e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb689fb0 to 0xeb689ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85589080
INFO: task kworker/1:658:5041 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 88b27000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
r5:85599800 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08
r9:83018005 r8:85599800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb69b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85512b8c r4:85512800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85512b8c r4:8556be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85599800 r8:8556beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8556be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8556be80 r8:80287e08 r7:eb291e60 r6:85572b80 r5:85599800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb699fb0 to 0xeb699ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85644440
INFO: task kworker/0:298:5043 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 88d29000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:852cfa40
task:kworker/1:659 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856447c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8559bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855d178c r4:855d1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:855d178c r4:85572c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8559bc00 r8:85572c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572c00 r8:80287e08 r7:eb65de60 r6:85572c80 r5:8559bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6a5fb0 to 0xeb6a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85589540
INFO: task kworker/1:659:5045 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8902a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0: 00000000 00000000 00000000 00000000
task:kworker/0:299 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:8545bc00
r4:8545bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8545bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6c3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855d1b8c r4:855d1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d1b8c r4:8556bf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545bc00 r8:8556bf2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8556bf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8556bf00 r8:80287e08 r7:eb291e60 r6:85572d00 r5:8545bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6a9fb0 to 0xeb6a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85644700
INFO: task kworker/0:299:5047 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8912d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:660:5050 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:660 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6c1d84 r8:00000002 r7:60000013 r6:eb6c1d8c r5:855a9800
r4:855a9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855a9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855894c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb703000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85513f8c r4:85513c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85513f8c r4:85572d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855a9800 r8:85572dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85572d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85572d80 r8:80287e08 r7:eb65de60 r6:85572e00 r5:855a9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6c1fb0 to 0xeb6c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855898c0
INFO: task kworker/1:660:5050 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:661:5051 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:661 state:D stack:0 pid:5051 tgid:5051 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6d1d84 r8:00000002 r7:60000113 r6:eb6d1d8c r5:855aa400
r4:855aa400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855aa400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589800
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:8551338c r4:85513000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8551338c r4:85572e80
r10:61c88647 r9:855aa400 r8:85572eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 89630000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:300:5053 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:300 state:D stack:0 pid:5053 tgid:5053 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6d5d84 r8:00000002 r7:60000113 r6:eb6d5d8c r5:855ab000
r4:855ab000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r9:83018005 r8:855ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
r5:855d1f8c r4:855d1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d1f8c r4:8556bf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855ab000 r8:8556bfac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8556bf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8556bf80 r8:80287e08 r7:eb291e60 r6:85572f80 r5:855ab000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6d5fb0 to 0xeb6d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85644740
INFO: task kworker/0:300:5053 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:301:5055 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
Workqueue: events bpf_prog_free_deferred
r5:855abc00 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644a40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8551378c r4:85513400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8551378c r4:8558b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855abc00 r8:8558b02c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558b000 r8:80287e08 r7:eb291e60 r6:85582000 r5:855abc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6e5fb0 to 0xeb6e5ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r5:80070113 r4:80239bb0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r5:852bd78c r4:852bd400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
r4:855a8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855a8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6f7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85513b8c r4:85513800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85513b8c r4:85582080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855a8000 r8:855820ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85582080 r8:80287e08 r7:eb6c1e60 r6:85582100 r5:855a8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6e1fb0 to 0xeb6e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85589f00
INFO: task kworker/1:662:5057 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 89d79000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:302:5059 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:302 state:D stack:0 pid:5059 tgid:5059 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3f1d84 r8:00000002 r7:60000113 r6:eb3f1d8c r5:84abb000
r4:84abb000
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r5:855d238c r4:855d2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84abb000 r8:8558b0ac r7:82804d40 r6:dddced80 r5:dddceda0
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:855ac800
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:8567cf8c r4:8567cc00
r10:61c88647 r9:855ac800 r8:855821ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb649fb0 to 0xeb649ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855892c0
INFO: task kworker/1:663:5061 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8a5d0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:664 state:D stack:0 pid:5064 tgid:5064 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:8567c38c r4:8567c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:665 state:D stack:0 pid:5065 tgid:5065 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb719d84 r8:00000002 r7:60000113 r6:eb719d8c r5:855ae000
r4:855ae000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855ae000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:8567c78c r4:8567c400
Exception stack(0xeb719fb0 to 0xeb719ff8)
Exception stack(0xeaf29d28 to 0xeaf29d70)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000001
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:666:5067 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:666 state:D stack:0 pid:5067 tgid:5067 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb725d84 r8:00000002 r7:60000113 r6:eb725d8c r5:855aec00
r4:855aec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855aec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558e380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb727000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8567cb8c r4:8567c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8567cb8c r4:85582480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855aec00 r8:855824ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r5:80070113 r4:80239bb0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:667:5069 blocked for more than 462 seconds.
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r5:8567d38c r4:8567d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8567d38c r4:85582580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84abbc00 r8:855825ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:84abd400
r4:00000000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:855d2f8c r4:855d2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d2f8c r4:8558b200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84abd400 r8:8558b22c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558b200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558b200 r8:80287e08 r7:eb291e60 r6:8558b280 r5:84abd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb731fb0 to 0xeb731ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85606180
INFO: task kworker/0:303:5073 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r4:eaf29dc0
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08
r5:855d338c r4:855d3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8558b300 r8:80287e08 r7:eb731e60 r6:8558b380 r5:84abe000
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8b811000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:668:5078 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:668 state:D stack:0 pid:5078 tgid:5078 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r4:8560d400
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:8560d400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
r5:8567d78c r4:8567d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8567d78c r4:85582600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8560d400 r8:8558262c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85582600 r8:80287e08 r7:eb735e60 r6:8558b400 r5:8560d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb749fb0 to 0xeb749ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8558e740
INFO: task kworker/1:668:5078 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8bd51000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:8567db8c r4:8567d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fa0: 00000000 00000000 00000000 00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:670:5081 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:670 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb755d84 r8:00000002 r7:60000113 r6:eb755d8c r5:84ae8000
r4:84ae8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ae8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558e300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ae8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eafa1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8567ef8c r4:8567ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8567ef8c r4:85582700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae8000 r8:8558272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85582700 r8:80287e08 r7:eb751e60 r6:8558b500 r5:84ae8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb755fb0 to 0xeb755ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8558e980
INFO: task kworker/1:670:5081 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8c434000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:8530ac00
9fa0: 00000000 00000000 00000000 00000000
r5:84ae8c00 r4:8291a680
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558ed80
r5:8567df8c r4:8567dc00
r7:ddde2d80 r6:83018200 r5:8567df8c r4:85582780
r4:8558e980
Exception stack(0xeaf29d28 to 0xeaf29d70)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:305:5084 blocked for more than 462 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:305 state:D stack:0 pid:5084 tgid:5084 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb55dd84 r8:00000002 r7:60000113 r6:eb55dd8c r5:84ae9800
r4:84ae9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ae9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845ee500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ae9800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e01d1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84b6938c r4:84b69000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b6938c r4:8558b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae9800 r8:8558b62c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558b600 r8:80287e08 r7:eb701e60 r6:8558b680 r5:84ae9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xeaf29d28 to 0xeaf29d70)
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84aeb000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:8567e38c r4:8567e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84aeb000 r8:8558282c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85582800 r8:80287e08 r7:eb755e60 r6:8558b700 r5:84aeb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb761fb0 to 0xeb761ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8558ec00
INFO: task kworker/1:672:5087 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8cf37000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0: 00000000 00000000 00000000 00000000
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:306:5088 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:306 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb765d84 r8:00000002 r7:60000113 r6:eb765d8c r5:84aebc00
r4:84aebc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84aebc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654e80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:855d378c r4:855d3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d378c r4:8558b780
r4:8558b780
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:00000000
r5:80070113 r4:80239bb0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558efc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84aea400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadcb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8567e78c r4:8567e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8567e78c r4:85582880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84aea400 r8:855828ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85582880 r8:80287e08 r7:eb755e60 r6:8558b880 r5:84aea400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb76dfb0 to 0xeb76dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8558ec80
INFO: task kworker/1:673:5090 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8d400000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:674:5092 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:674 state:D stack:0 pid:5092 tgid:5092 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb775d84 r8:00000002 r7:60000113 r6:eb775d8c r5:84aec800
r4:84aec800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84aec800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:8567eb8c r4:8567e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8567eb8c r4:85582900
r10:61c88647 r9:84aec800 r8:8558292c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d60: 80230ad0 80239bb0 80070113 ffffffff
r4:eaf29dc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:675:5094 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:675 state:D stack:0 pid:5094 tgid:5094 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb77dd84 r8:00000002 r7:60000013 r6:eb77dd8c r5:84aed400
r4:84aed400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84aed400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84aed400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8567f78c r4:8567f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8567f78c r4:85582980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84aed400 r8:855829ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85582980 r8:80287e08 r7:eb755e60 r6:8558b980 r5:84aed400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb77dfb0 to 0xeb77dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8558ef80
INFO: task kworker/1:675:5094 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8d9d5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r5:852bd78c r4:852bd400
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0: 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:676 state:D stack:0 pid:5096 tgid:5096 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb74dd84 r8:00000002 r7:60000113 r6:eb74dd8c r5:84abec00
r4:84abec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84abec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845ee5c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84abec00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb093000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8567f38c r4:8567f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8567f38c r4:85582a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84abec00 r8:85582a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85582a00 r8:80287e08 r7:eb77de60 r6:85582a80 r5:84abec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb74dfb0 to 0xeb74dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8557ff40
INFO: task kworker/1:676:5096 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8d9d5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:8530ac00
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:677:5099 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:677 state:D stack:0 pid:5099 tgid:5099 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb785d84 r8:00000002 r7:60000013 r6:eb785d8c r5:855a8c00
r4:855a8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855a8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564c180
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0e5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8567fb8c r4:8567f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8567fb8c r4:85582b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855a8c00 r8:85582b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85582b00 r8:80287e08 r7:eb77de60 r6:85582b80 r5:855a8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb785fb0 to 0xeb785ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8558e480
INFO: task kworker/1:677:5099 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8dd87000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:678:5101 blocked for more than 463 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb781d84 r8:00000002 r7:60000013 r6:eb781d8c r5:855b0000
r4:855b0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564c000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8567ff8c r4:8567fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:855b0000 r8:85582c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xeaf29d28 to 0xeaf29d70)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:679:5103 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:679 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb78dd84 r8:00000002 r7:60000013 r6:eb78dd8c r5:84aee000
r4:84aee000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84aee000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:8568438c r4:85684000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
dfa0: 00000000 00000000 00000000 00000000
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
r5:852bd78c r4:852bd400
r4:00000001
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564c880
r5:85684f8c r4:85684c00
r7:ddde2d80 r6:83018200 r5:85684f8c r4:85582d80
r10:00000000 r9:85582d80 r8:80287e08 r7:eb78de60 r6:8558ba80 r5:84aeec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb795fb0 to 0xeb795ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8564c2c0
INFO: task kworker/1:680:5105 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8e17f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
INFO: task kworker/1:681:5106 blocked for more than 463 seconds.
r4:855a0000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08
r9:83018205 r8:855a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
r5:8568478c r4:85684400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8568478c r4:85582e00
r10:61c88647 r9:855a0000 r8:85582e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:681:5106 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8e381000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564c740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb34f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85684b8c r4:85684800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85684b8c r4:85582e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855a1800 r8:85582eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85582e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85582e80 r8:80287e08 r7:eb795e60 r6:8558bb80 r5:855a1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7a1fb0 to 0xeb7a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:82ac21e4
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
r4:00000001
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8568538c r4:85685000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Workqueue: events bpf_prog_free_deferred
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:684:5113 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:684 state:D stack:0 pid:5113 tgid:5113 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7b1d84 r8:00000002 r7:60000113 r6:eb7b1d8c r5:855a2400
r4:855a2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8568578c r4:85685400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8568578c r4:85582f80
r10:61c88647 r9:855a2400 r8:85582fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xeaf29d28 to 0xeaf29d70)
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r5:852bd78c r4:852bd400
r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:685:5114 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:685 state:D stack:0 pid:5114 tgid:5114 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7b5d84 r8:00000002 r7:60000013 r6:eb7b5d8c r5:855a3c00
r4:855a3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855a3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564cc80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4d1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85685b8c r4:85685800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85685b8c r4:85656000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855a3c00 r8:8565602c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85656000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85656000 r8:80287e08 r7:eb7b1e60 r6:8558bd00 r5:855a3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7b5fb0 to 0xeb7b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8564c940
INFO: task kworker/1:685:5114 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8ee7e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r5:852bd78c r4:852bd400
r4:00000001
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85685f8c r4:85685c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85685f8c r4:85656080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855a5400 r8:856560ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85656080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85656080 r8:80287e08 r7:eb7b5e60 r6:8558bd80 r5:855a5400
r4:8564cb00
r4:00000000
r4:82ac21e4
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:855a6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855a6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564cf40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb505000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8568638c r4:85686000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8568638c r4:85656100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855a6000 r8:8565612c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85656100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85656100 r8:80287e08 r7:eb7bde60 r6:8558be00 r5:855a6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7c1fb0 to 0xeb7c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8564cb80
INFO: task kworker/1:687:5119 is blocked on a mutex likely owned by task kworker/1:426:4465.
Call trace:
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:688 state:D stack:0 pid:5121 tgid:5121 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7c5d84 r8:00000002 r7:60000013 r6:eb7c5d8c r5:855a6c00
r4:855a6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855a6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644ac0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb519000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8568678c r4:85686400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8568678c r4:85656180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855a6c00 r8:856561ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85656180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85656180 r8:80287e08 r7:eb7c1e60 r6:8558be80 r5:855a6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7c5fb0 to 0xeb7c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8564cdc0
INFO: task kworker/1:688:5121 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 8fc9c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:689:5123 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:689 state:D stack:0 pid:5123 tgid:5123 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7c9d84 r8:00000002 r7:60000013 r6:eb7c9d8c r5:855a4800
r4:855a4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855a4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856520c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb563000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85686f8c r4:85686c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85686f8c r4:85656200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855a4800 r8:8565622c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:85656200 r8:80287e08 r7:eb7c5e60 r6:8558bf00 r5:855a4800
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:690:5125 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:690 state:D stack:0 pid:5125 tgid:5125 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7cdd84 r8:00000002 r7:60000013 r6:eb7cdd8c r5:855a3000
r4:855a3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855a3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
r9:83018205 r8:855a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
r5:85686b8c r4:85686800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85686b8c r4:85656280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855a3000 r8:856562ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85656280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85656280 r8:80287e08 r7:eb7c9e60 r6:8558bf80 r5:855a3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7cdfb0 to 0xeb7cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8564cfc0
INFO: task kworker/1:690:5125 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9074e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r4:8559ec00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8559ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb597000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8568738c r4:85687000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8568738c r4:85656300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8559ec00 r8:8565632c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85656300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85656300 r8:80287e08 r7:eb7c9e60 r6:8565e000 r5:8559ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7d1fb0 to 0xeb7d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85652000
INFO: task kworker/1:691:5126 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 90b26000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
r5:85620000 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d5e08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8568778c r4:85687400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8568778c r4:85656380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85620000 r8:856563ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85656380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85656380 r8:80287e08 r7:eb7d1e60 r6:8565e080 r5:85620000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7d5fb0 to 0xeb7d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85652140
INFO: task kworker/1:692:5127 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 90e5a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r5:00001000 r4:dfd17000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:307 state:D stack:0 pid:5130 tgid:5130 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb741d84 r8:00000002 r7:60000113 r6:eb741d8c r5:85620c00
r4:85620c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85620c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654f80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85620c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb589000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855d3b8c r4:855d3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855d3b8c r4:8565e100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85620c00 r8:8565e12c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565e100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565e100 r8:80287e08 r7:eb55de60 r6:8565e180 r5:85620c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb741fb0 to 0xeb741ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85654d80
INFO: task kworker/0:307:5130 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9142b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:308:5131 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:308 state:D stack:0 pid:5131 tgid:5131 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb789d84 r8:00000002 r7:60000013 r6:eb789d8c r5:85621800
r4:85621800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85621800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f900
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85621800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf61000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f538c r4:855f5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f538c r4:8565e200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85621800 r8:8565e22c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565e200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565e200 r8:80287e08 r7:eb55de60 r6:8565e280 r5:85621800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb789fb0 to 0xeb789ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85654d80
INFO: task kworker/0:308:5131 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 91698000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:309:5137 blocked for more than 463 seconds.
task:kworker/0:309 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb21dd84 r8:00000002 r7:60000113 r6:eb21dd8c r5:85623000
r4:85623000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85623000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85623000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e08a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84b68f8c r4:84b68c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b68f8c r4:8565e300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85623000 r8:8565e32c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565e300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565e300 r8:80287e08 r7:eb789e60 r6:8565e380 r5:85623000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb21dfb0 to 0xeb21dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85654340
INFO: task kworker/0:309:5137 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9197c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:693:5139 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:693 state:D stack:0 pid:5139 tgid:5139 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7d9d84 r8:00000002 r7:60000113 r6:eb7d9d8c r5:85623c00
r4:85623c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85623c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85652940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85623c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaec9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85687b8c r4:85687800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85687b8c r4:85656400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85623c00 r8:8565642c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85656400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85656400 r8:80287e08 r7:eb7d5e60 r6:8565e400 r5:85623c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7d9fb0 to 0xeb7d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85652400
INFO: task kworker/1:693:5139 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 91c9f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:310:5141 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:310 state:D stack:0 pid:5141 tgid:5141 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7ddd84 r8:00000002 r7:60000013 r6:eb7ddd8c r5:85624800
r4:85624800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85624800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85624800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaadb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f438c r4:855f4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f438c r4:8565e480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85624800 r8:8565e4ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565e480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565e480 r8:80287e08 r7:eb789e60 r6:8565e500 r5:85624800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7ddfb0 to 0xeb7ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8565f1c0
INFO: task kworker/0:310:5141 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 91f39000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:311:5143 blocked for more than 463 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:311 state:D stack:0 pid:5143 tgid:5143 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb41dd84 r8:00000002 r7:60000013 r6:eb41dd8c r5:85625400
r4:85625400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85625400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85625400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab51000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f478c r4:855f4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f478c r4:8565e580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85625400 r8:8565e5ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565e580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565e580 r8:80287e08 r7:eb789e60 r6:8565e600 r5:85625400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb41dfb0 to 0xeb41dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8565f100
INFO: task kworker/0:311:5143 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 921a8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:312:5145 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:312 state:D stack:0 pid:5145 tgid:5145 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5add84 r8:00000002 r7:60000113 r6:eb5add8c r5:85626000
r4:85626000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85626000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85626000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae0f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f4b8c r4:855f4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f4b8c r4:8565e680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85626000 r8:8565e6ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565e680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565e680 r8:80287e08 r7:eb789e60 r6:8565e700 r5:85626000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5adfb0 to 0xeb5adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8565f100
INFO: task kworker/0:312:5145 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 924b1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:694:5147 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:694 state:D stack:0 pid:5147 tgid:5147 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:85626c00
r4:85626c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85626c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475080
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85626c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a438c r4:856a4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856a438c r4:85656480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85626c00 r8:856564ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85656480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85656480 r8:80287e08 r7:eb7d9e60 r6:8565e800 r5:85626c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c9fb0 to 0xeb5c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856527c0
INFO: task kworker/1:694:5147 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 92842000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:313:5148 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:313 state:D stack:0 pid:5148 tgid:5148 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000113 r6:eb5cdd8c r5:85622400
r4:85622400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85622400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f7c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85622400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf0b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f4f8c r4:855f4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f4f8c r4:8565e780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85622400 r8:8565e7ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565e780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565e780 r8:80287e08 r7:eb789e60 r6:8565e880 r5:85622400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5cdfb0 to 0xeb5cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8565f4c0
INFO: task kworker/0:313:5148 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 92b13000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:695:5150 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:695 state:D stack:0 pid:5150 tgid:5150 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5b9d84 r8:00000002 r7:60000113 r6:eb5b9d8c r5:85628000
r4:85628000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85628000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85628000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb42f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f778c r4:855f7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:855f778c r4:85656500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85628000 r8:8565652c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85656500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85656500 r8:80287e08 r7:eb5c9e60 r6:8565e900 r5:85628000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b9fb0 to 0xeb5b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856529c0
INFO: task kworker/1:695:5150 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 92dc3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:314:5152 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:314 state:D stack:0 pid:5152 tgid:5152 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5d5d84 r8:00000002 r7:60000013 r6:eb5d5d8c r5:85628c00
r4:85628c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85628c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565fac0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85628c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb075000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f578c r4:855f5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f578c r4:8565e980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85628c00 r8:8565e9ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565e980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565e980 r8:80287e08 r7:eb789e60 r6:8565ea00 r5:85628c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5d5fb0 to 0xeb5d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8565f780
INFO: task kworker/0:314:5152 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9335e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:315:5153 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:315 state:D stack:0 pid:5153 tgid:5153 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5edd84 r8:00000002 r7:60000113 r6:eb5edd8c r5:85629800
r4:85629800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85629800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565fcc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85629800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f5b8c r4:855f5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f5b8c r4:8565ea80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85629800 r8:8565eaac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565ea80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565ea80 r8:80287e08 r7:eb5d5e60 r6:8565eb00 r5:85629800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5edfb0 to 0xeb5edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8565f780
INFO: task kworker/0:315:5153 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 93591000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:316:5155 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:316 state:D stack:0 pid:5155 tgid:5155 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb60dd84 r8:00000002 r7:60000013 r6:eb60dd8c r5:8562b000
r4:8562b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8562b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565ffc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8562b000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb219000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f5f8c r4:855f5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f5f8c r4:8565eb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8562b000 r8:8565ebac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565eb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565eb80 r8:80287e08 r7:eb5ede60 r6:8565ec00 r5:8562b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb60dfb0 to 0xeb60dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8565fb40
INFO: task kworker/0:316:5155 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 93591000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:317:5157 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:317 state:D stack:0 pid:5157 tgid:5157 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:8562bc00
r4:8562bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8562bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8562bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f6b8c r4:855f6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f6b8c r4:8565ec80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8562bc00 r8:8565ecac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565ec80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565ec80 r8:80287e08 r7:eb60de60 r6:8565ed00 r5:8562bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb61dfb0 to 0xeb61dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8565fb40
INFO: task kworker/0:317:5157 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 93c31000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:318:5160 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:318 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5e1d84 r8:00000002 r7:60000113 r6:eb5e1d8c r5:8562c800
r4:8562c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8562c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564cfc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8562c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb261000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f638c r4:855f6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f638c r4:8565ed80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8562c800 r8:8565edac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565ed80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565ed80 r8:80287e08 r7:eb61de60 r6:8565ee00 r5:8562c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5e1fb0 to 0xeb5e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85588080
INFO: task kworker/0:318:5160 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 93f2d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:319:5162 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:319 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb671d84 r8:00000002 r7:60000013 r6:eb671d8c r5:855b2400
r4:855b2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2c5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f678c r4:855f6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f678c r4:8565ee80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b2400 r8:8565eeac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565ee80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565ee80 r8:80287e08 r7:eb61de60 r6:85656580 r5:855b2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb671fb0 to 0xeb671ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85588240
INFO: task kworker/0:319:5162 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 94b0b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:320:5164 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:320 state:D stack:0 pid:5164 tgid:5164 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb659d84 r8:00000002 r7:60000013 r6:eb659d8c r5:8562e000
r4:8562e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8562e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8562e000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3d9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f6f8c r4:855f6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f6f8c r4:8565ef00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8562e000 r8:8565ef2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8565ef00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8565ef00 r8:80287e08 r7:eb61de60 r6:8565ef80 r5:8562e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb659fb0 to 0xeb659ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85588240
INFO: task kworker/0:320:5164 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 94f3b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:321:5166 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:321 state:D stack:0 pid:5166 tgid:5166 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb62dd84 r8:00000002 r7:60000113 r6:eb62dd8c r5:8562ec00
r4:8562ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8562ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588640
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8562ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb413000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f738c r4:855f7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f738c r4:8558c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8562ec00 r8:8558c02c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558c000 r8:80287e08 r7:eb659e60 r6:8558c080 r5:8562ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb62dfb0 to 0xeb62dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855883c0
INFO: task kworker/0:321:5166 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 94f3b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:852cfa40
INFO: task kworker/0:322:5169 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:322 state:D stack:0 pid:5169 tgid:5169 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb679d84 r8:00000002 r7:60000113 r6:eb679d8c r5:8562d400
r4:8562d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8562d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8562d400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb43f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:855f7b8c r4:855f7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f7b8c r4:8558c100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8562d400 r8:8558c12c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558c100 r8:80287e08 r7:eb62de60 r6:8558c180 r5:8562d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb679fb0 to 0xeb679ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855886c0
INFO: task kworker/0:322:5169 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9530b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r9:83018205 r8:8562a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
r5:84449f8c r4:84449c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r5:80070113 r4:80239bb0
r5:00001000 r4:dfd17000
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb685d84 r8:00000002 r7:60000013 r6:eb685d8c r5:85638000
r4:85638000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85638000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588c80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85638000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb45f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849ac38c r4:849ac000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849ac38c r4:8558c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85638000 r8:8558c2ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558c280 r8:80287e08 r7:eb679e60 r6:8558c300 r5:85638000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb685fb0 to 0xeb685ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85588840
INFO: task kworker/0:323:5172 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 95b39000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:324:5174 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:324 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:8291a684 r9:eb691d84 r8:00000002 r7:60000113 r6:eb691d8c r5:85638c00
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:855f7f8c r4:855f7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:855f7f8c r4:8558c380
r10:00000000 r9:8558c380 r8:80287e08 r7:eb685e60 r6:8558c400 r5:85638c00
INFO: task kworker/0:324:5174 is blocked on a mutex likely owned by task kworker/1:426:4465.
9d20: 95b39000 ed8b5000 00000001 80239b98 7f3cf000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fa0: 00000000 00000000 00000000 00000000
task:kworker/0:325 state:D stack:0 pid:5176 tgid:5176 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565ff00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849acb8c r4:849ac800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849acb8c r4:8558c480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85639800 r8:8558c4ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558c480 r8:80287e08 r7:eb685e60 r6:8558c500 r5:85639800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6a1fb0 to 0xeb6a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85588a80
INFO: task kworker/0:325:5176 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 961ae000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:326:5178 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:326 state:D stack:0 pid:5178 tgid:5178 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6bdd84 r8:00000002 r7:60000113 r6:eb6bdd8c r5:8563b000
r4:8563b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8563b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8563b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb479000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849ac78c r4:849ac400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849ac78c r4:8558c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8563b000 r8:8558c5ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558c580 r8:80287e08 r7:eb6a1e60 r6:8558c600 r5:8563b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6bdfb0 to 0xeb6bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85588c40
INFO: task kworker/0:326:5178 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 96994000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:327:5179 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:327 state:D stack:0 pid:5179 tgid:5179 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6b1d84 r8:00000002 r7:60000113 r6:eb6b1d8c r5:8563bc00
r4:8563bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8563bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8563bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849ad38c r4:849ad000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849ad38c r4:8558c680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8563bc00 r8:8558c6ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558c680 r8:80287e08 r7:eb6a1e60 r6:8558c700 r5:8563bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6b1fb0 to 0xeb6b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8565ff40
INFO: task kworker/0:327:5179 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 96994000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:852bd78c r4:852bd400
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:328:5182 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:328 state:D stack:0 pid:5182 tgid:5182 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6fdd84 r8:00000002 r7:60000113 r6:eb6fdd8c r5:855b5400
r4:855b5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849acf8c r4:849acc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849acf8c r4:8558c780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b5400 r8:8558c7ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558c780 r8:80287e08 r7:eb6b1e60 r6:85656680 r5:855b5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6fdfb0 to 0xeb6fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85571080
INFO: task kworker/0:328:5182 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 96d3e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:8530ac00
r4:00000001
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:329:5184 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:329 state:D stack:0 pid:5184 tgid:5184 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb715d84 r8:00000002 r7:60000113 r6:eb715d8c r5:855b3c00
r4:855b3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb613000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849ad78c r4:849ad400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849ad78c r4:8558c800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b3c00 r8:8558c82c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558c800 r8:80287e08 r7:eb6b1e60 r6:85656700 r5:855b3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb715fb0 to 0xeb715ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85571180
INFO: task kworker/0:329:5184 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 97390000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/0:330:5186 blocked for more than 464 seconds.
r10:8291a684 r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:855b6000
r5:855b6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571a80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6b9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849aeb8c r4:849ae800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849aeb8c r4:8558c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b6000 r8:8558c8ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558c880 r8:80287e08 r7:eb715e60 r6:85656780 r5:855b6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb72dfb0 to 0xeb72dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855712c0
INFO: task kworker/0:330:5186 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 97607000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:331:5187 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:331 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb73dd84 r8:00000002 r7:60000113 r6:eb73dd8c r5:855b4800
r4:855b4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb643000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:849adb8c r4:849ad800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849adb8c r4:8558c900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b4800 r8:8558c92c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558c900 r8:80287e08 r7:eb72de60 r6:85656800 r5:855b4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb73dfb0 to 0xeb73dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855712c0
INFO: task kworker/0:331:5187 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 97b79000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:332:5189 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:332 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7e5d84 r8:00000002 r7:60000013 r6:eb7e5d8c r5:855b0c00
r4:855b0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08
r4:00000000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:849adf8c r4:849adc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849adf8c r4:8558c980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b0c00 r8:8558c9ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558c980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
r4:00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
r5:80070113 r4:80239bb0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:333:5191 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:333 state:D stack:0 pid:5191 tgid:5191 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7edd84 r8:00000002 r7:60000013 r6:eb7edd8c r5:855b3000
r4:855b3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571800
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb681000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849ae38c r4:849ae000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849ae38c r4:8558ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b3000 r8:8558ca2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558ca00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558ca00 r8:80287e08 r7:eb72de60 r6:85656900 r5:855b3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7edfb0 to 0xeb7edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855714c0
INFO: task kworker/0:333:5191 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 97ee2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r5:852bd78c r4:852bd400
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:852cfa40
task:kworker/0:334 state:D stack:0 pid:5193 tgid:5193 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7f5d84 r8:00000002 r7:60000113 r6:eb7f5d8c r5:855b6c00
r4:855b6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb69d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849ae78c r4:849ae400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849ae78c r4:8558ca80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b6c00 r8:8558caac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558ca80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558ca80 r8:80287e08 r7:eb72de60 r6:85656980 r5:855b6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7f5fb0 to 0xeb7f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85571680
INFO: task kworker/0:334:5193 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 98790000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:335:5196 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:335 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb801d84 r8:00000002 r7:60000113 r6:eb801d8c r5:855b8c00
r4:855b8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571b80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6d9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849aef8c r4:849aec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849aef8c r4:8558cb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b8c00 r8:8558cb2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558cb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558cb00 r8:80287e08 r7:eb72de60 r6:85656a00 r5:855b8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb801fb0 to 0xeb801ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85571880
INFO: task kworker/0:335:5196 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 98828000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r4:00000000
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:336:5198 blocked for more than 464 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:336 state:D stack:0 pid:5198 tgid:5198 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb809d84 r8:00000002 r7:60000013 r6:eb809d8c r5:855b8000
r4:855b8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb809e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf340
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb83d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849d878c r4:849d8400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849d878c r4:8558cb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b8000 r8:8558cbac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558cb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558cb80 r8:80287e08 r7:eb801e60 r6:85656a80 r5:855b8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb809fb0 to 0xeb809ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85571900
INFO: task kworker/0:336:5198 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 98828000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0: 00000000 00000000 00000000 00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:849af38c r4:849af000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849af38c r4:8558cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855ba400 r8:8558cc2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558cc00 r8:80287e08 r7:eb809e60 r6:85656b00 r5:855ba400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb80dfb0 to 0xeb80dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85571900
INFO: task kworker/0:337:5199 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
Exception stack(0xeaf29d28 to 0xeaf29d70)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:849af78c r4:849af400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849af78c r4:8558cc80
r10:61c88647 r9:855b9800 r8:8558ccac r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
9d20: 98ecc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bb000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb825e08
r9:83018005 r8:855bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
r5:849afb8c r4:849af800
r7:dddced80 r6:83018000 r5:849afb8c r4:8558cd00
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xeaf29d28 to 0xeaf29d70)
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:340:5205 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:340 state:D stack:0 pid:5205 tgid:5205 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb835d84 r8:00000002 r7:60000013 r6:eb835d8c r5:855bd400
r4:855bd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855bd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb835e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85652b40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb821000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849aff8c r4:849afc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849aff8c r4:8558cd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855bd400 r8:8558cdac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558cd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558cd80 r8:80287e08 r7:eb809e60 r6:85656c80 r5:855bd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:849d838c r4:849d8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9a13f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:342:5210 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:342 state:D stack:0 pid:5210 tgid:5210 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb859d84 r8:00000002 r7:60000113 r6:eb859d8c r5:855bec00
r4:855bec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855bec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb859e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb855000
r5:849d8f8c r4:849d8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849d8f8c r4:8558ce80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
9d20: 9a377000 ed8b5000 00000001 80239b98 7f3cf000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84a24800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb849000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849d8b8c r4:849d8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849d8b8c r4:8558cf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84a24800 r8:8558cf2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558cf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558cf00 r8:80287e08 r7:eb859e60 r6:85656e00 r5:84a24800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb861fb0 to 0xeb861ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bf1c0
INFO: task kworker/0:343:5212 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9a624000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:344:5214 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:344 state:D stack:0 pid:5214 tgid:5214 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb355d84 r8:00000002 r7:60000113 r6:eb355d8c r5:855bc800
r4:855bc800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855bc800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bfb00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0543000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849d9f8c r4:849d9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849d9f8c r4:8558cf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855bc800 r8:8558cfac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8558cf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8558cf80 r8:80287e08 r7:eb859e60 r6:85656e80 r5:855bc800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb355fb0 to 0xeb355ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bf1c0
INFO: task kworker/0:344:5214 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9a8b4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:345:5215 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:345 state:D stack:0 pid:5215 tgid:5215 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:855b1800
r4:855b1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855b1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf6c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa6b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849d938c r4:849d9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849d938c r4:854ca000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855b1800 r8:854ca02c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca000 r8:80287e08 r7:eb355e60 r6:85656f00 r5:855b1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4ddfb0 to 0xeb4ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bf1c0
INFO: task kworker/0:345:5215 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9b196000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:346:5218 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:346 state:D stack:0 pid:5218 tgid:5218 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7a5d84 r8:00000002 r7:60000013 r6:eb7a5d8c r5:855c1800
r4:855c1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855c1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf840
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfae3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849d978c r4:849d9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849d978c r4:854ca080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855c1800 r8:854ca0ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca080 r8:80287e08 r7:eb355e60 r6:85656f80 r5:855c1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7a5fb0 to 0xeb7a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bf500
INFO: task kworker/0:346:5218 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9b32a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:347:5220 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:347 state:D stack:0 pid:5220 tgid:5220 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6c9d84 r8:00000002 r7:60000013 r6:eb6c9d8c r5:8563a400
r4:8563a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8563a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8563a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff0f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849d9b8c r4:849d9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849d9b8c r4:854ca100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8563a400 r8:854ca12c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca100 r8:80287e08 r7:eb355e60 r6:854ca180 r5:8563a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6c9fb0 to 0xeb6c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bf600
INFO: task kworker/0:347:5220 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9b6c9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:348:5222 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:348 state:D stack:0 pid:5222 tgid:5222 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb79dd84 r8:00000002 r7:60000013 r6:eb79dd8c r5:8563e000
r4:8563e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8563e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bfbc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8563e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06d9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849da38c r4:849da000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849da38c r4:854ca200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8563e000 r8:854ca22c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca200 r8:80287e08 r7:eb355e60 r6:854ca280 r5:8563e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb79dfb0 to 0xeb79dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bfac0
INFO: task kworker/0:348:5222 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9b92a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:349:5223 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:349 state:D stack:0 pid:5223 tgid:5223 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6ddd84 r8:00000002 r7:60000113 r6:eb6ddd8c r5:8563ec00
r4:8563ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8563ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6dde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bfdc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8563ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0843000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849da78c r4:849da400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849da78c r4:854ca300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8563ec00 r8:854ca32c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca300 r8:80287e08 r7:eb79de60 r6:854ca380 r5:8563ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6ddfb0 to 0xeb6ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bfac0
INFO: task kworker/0:349:5223 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9bcf6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:350:5226 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:350 state:D stack:0 pid:5226 tgid:5226 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb875d84 r8:00000002 r7:60000013 r6:eb875d8c r5:8563d400
r4:8563d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8563d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9200
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8563d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf8b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849db38c r4:849db000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849db38c r4:854ca400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8563d400 r8:854ca42c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca400 r8:80287e08 r7:eb6dde60 r6:854ca480 r5:8563d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb875fb0 to 0xeb875ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bfc40
INFO: task kworker/0:350:5226 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9c1e1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:351:5228 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:351 state:D stack:0 pid:5228 tgid:5228 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb87dd84 r8:00000002 r7:60000113 r6:eb87dd8c r5:8563c800
r4:8563c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8563c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bff00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8563c800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849dab8c r4:849da800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849dab8c r4:854ca500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8563c800 r8:854ca52c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca500 r8:80287e08 r7:eb875e60 r6:854ca580 r5:8563c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb87dfb0 to 0xeb87dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bfd80
INFO: task kworker/0:351:5228 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9c420000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:352:5229 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:352 state:D stack:0 pid:5229 tgid:5229 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb885d84 r8:00000002 r7:60000013 r6:eb885d8c r5:855c2400
r4:855c2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855c2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadcd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849daf8c r4:849dac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849daf8c r4:854ca600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855c2400 r8:854ca62c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca600 r8:80287e08 r7:eb875e60 r6:854a5000 r5:855c2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb885fb0 to 0xeb885ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bfd80
INFO: task kworker/0:352:5229 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9c420000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:353:5232 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:353 state:D stack:0 pid:5232 tgid:5232 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb88dd84 r8:00000002 r7:60000113 r6:eb88dd8c r5:855c3000
r4:855c3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855c3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb88de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb105000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849dbf8c r4:849dbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849dbf8c r4:854ca700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855c3000 r8:854ca72c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca700 r8:80287e08 r7:eb875e60 r6:854a5080 r5:855c3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb88dfb0 to 0xeb88dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a9280
INFO: task kworker/0:353:5232 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9c8dc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:354:5234 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:354 state:D stack:0 pid:5234 tgid:5234 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb895d84 r8:00000002 r7:60000013 r6:eb895d8c r5:855c0000
r4:855c0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855c0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9100
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eafdd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849db78c r4:849db400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849db78c r4:854ca680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855c0000 r8:854ca6ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca680 r8:80287e08 r7:eb88de60 r6:854a5100 r5:855c0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb895fb0 to 0xeb895ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a9300
INFO: task kworker/0:354:5234 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9cb6e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:355:5236 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:355 state:D stack:0 pid:5236 tgid:5236 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb89dd84 r8:00000002 r7:60000013 r6:eb89dd8c r5:855c3c00
r4:855c3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855c3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb89de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849dbb8c r4:849db800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849dbb8c r4:854ca780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855c3c00 r8:854ca7ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca780 r8:80287e08 r7:eb88de60 r6:854a5180 r5:855c3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb89dfb0 to 0xeb89dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a9180
INFO: task kworker/0:355:5236 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9cdb4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:356:5238 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:356 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:855c4800
r4:855c4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855c4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9f40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb503000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849ddb8c r4:849dd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849ddb8c r4:854ca800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855c4800 r8:854ca82c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca800 r8:80287e08 r7:eb88de60 r6:854a5200 r5:855c4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8a5fb0 to 0xeb8a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a93c0
INFO: task kworker/0:356:5238 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9d047000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:357:5240 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:357 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8add84 r8:00000002 r7:60000113 r6:eb8add8c r5:855c5400
r4:855c5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855c5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a97c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2ad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849dc38c r4:849dc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849dc38c r4:854ca880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855c5400 r8:854ca8ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca880 r8:80287e08 r7:eb8a5e60 r6:854a5280 r5:855c5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8adfb0 to 0xeb8adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a9500
INFO: task kworker/0:357:5240 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9d20d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:358:5242 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:358 state:D stack:0 pid:5242 tgid:5242 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:855c6000
r4:855c6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855c6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:849dc78c r4:849dc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:855c6000 r8:854ca92c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854ca900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854ca900 r8:80287e08 r7:eb8a5e60 r6:854a5300 r5:855c6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8b5fb0 to 0xeb8b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a9780
INFO: task kworker/0:358:5242 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9d3a6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:359:5244 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:359 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8bdd84 r8:00000002 r7:60000113 r6:eb8bdd8c r5:855c6c00
r4:855c6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855c6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8bde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:849dcb8c r4:849dc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849dcb8c r4:854ca980
r4:854ca980
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:360:5246 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:360 state:D stack:0 pid:5246 tgid:5246 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:855c0c00
r4:855c0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855c0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9bc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:855c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb37b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849dcf8c r4:849dcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849dcf8c r4:854caa00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855c0c00 r8:854caa2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854caa00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854caa00 r8:80287e08 r7:eb8a5e60 r6:854a5400 r5:855c0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8c5fb0 to 0xeb8c5ff8)
5fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
r4:eaf29dc0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:852cfa40
INFO: task kworker/0:361:5248 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:361 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8cdd84 r8:00000002 r7:60000113 r6:eb8cdd8c r5:856f0c00
r4:856f0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9cc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849dd38c r4:849dd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849dd38c r4:854caa80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f0c00 r8:854caaac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854caa80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854caa80 r8:80287e08 r7:eb8a5e60 r6:854a5480 r5:856f0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8cdfb0 to 0xeb8cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a9940
INFO: task kworker/0:361:5248 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9db55000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:362:5250 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:362 state:D stack:0 pid:5250 tgid:5250 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8d5d84 r8:00000002 r7:60000013 r6:eb8d5d8c r5:856f2400
r4:856f2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849dd78c r4:849dd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849dd78c r4:854cab00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f2400 r8:854cab2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854cab00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854cab00 r8:80287e08 r7:eb8a5e60 r6:854a5500 r5:856f2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8d5fb0 to 0xeb8d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a99c0
INFO: task kworker/0:362:5250 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9dcce000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:363:5253 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:363 state:D stack:0 pid:5253 tgid:5253 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8e1d84 r8:00000002 r7:60000113 r6:eb8e1d8c r5:856f3000
r4:856f3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85652f40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb51f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849ddf8c r4:849ddc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849ddf8c r4:854cab80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f3000 r8:854cabac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854cab80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854cab80 r8:80287e08 r7:eb8a5e60 r6:854a5580 r5:856f3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8e1fb0 to 0xeb8e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a9dc0
INFO: task kworker/0:363:5253 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9e1ae000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:364:5255 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:364 state:D stack:0 pid:5255 tgid:5255 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8e9d84 r8:00000002 r7:60000113 r6:eb8e9d8c r5:856f4800
r4:856f4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bffc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb55f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849de38c r4:849de000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849de38c r4:854cac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f4800 r8:854cac2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854cac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854cac00 r8:80287e08 r7:eb8e1e60 r6:854a5600 r5:856f4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8e9fb0 to 0xeb8e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bf100
INFO: task kworker/0:364:5255 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9e1ae000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:365:5257 blocked for more than 465 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:365 state:D stack:0 pid:5257 tgid:5257 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8f1d84 r8:00000002 r7:60000013 r6:eb8f1d8c r5:856f3c00
r4:856f3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854806c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7a7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849df78c r4:849df400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849df78c r4:854cac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f3c00 r8:854cacac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854cac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854cac80 r8:80287e08 r7:eb8e9e60 r6:854a5680 r5:856f3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8f1fb0 to 0xeb8f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bf100
INFO: task kworker/0:365:5257 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9e588000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:366:5258 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:366 state:D stack:0 pid:5258 tgid:5258 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:856f1800
r4:856f1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854800c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb573000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849de78c r4:849de400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849de78c r4:854cad00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f1800 r8:854cad2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854cad00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854cad00 r8:80287e08 r7:eb8f1e60 r6:854a5700 r5:856f1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8f5fb0 to 0xeb8f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a9fc0
INFO: task kworker/0:366:5258 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9e8c9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:367:5260 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:367 state:D stack:0 pid:5260 tgid:5260 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8fdd84 r8:00000002 r7:60000113 r6:eb8fdd8c r5:856f5400
r4:856f5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480340
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849deb8c r4:849de800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849deb8c r4:854cad80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f5400 r8:854cadac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854cad80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854cad80 r8:80287e08 r7:eb8f1e60 r6:854a5780 r5:856f5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8fdfb0 to 0xeb8fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85480000
INFO: task kworker/0:367:5260 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9e8c9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:697:5262 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:697 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8f9d84 r8:00000002 r7:60000013 r6:eb8f9d8c r5:856f6c00
r4:856f6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:856f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead63000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a4f8c r4:856a4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856a4f8c r4:854a5800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f6c00 r8:854a582c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854a5800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854a5800 r8:80287e08 r7:eb5c9e60 r6:854a5880 r5:856f6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8f9fb0 to 0xeb8f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85499000
INFO: task kworker/1:697:5262 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9ee94000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:368:5265 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:368 state:D stack:0 pid:5265 tgid:5265 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb909d84 r8:00000002 r7:60000113 r6:eb909d8c r5:856f6000
r4:856f6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb909e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb75b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849def8c r4:849dec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849def8c r4:854cae00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f6000 r8:854cae2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:854cae00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854cae00 r8:80287e08 r7:eb8f1e60 r6:854a5900 r5:856f6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb909fb0 to 0xeb909ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85480500
INFO: task kworker/0:368:5265 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9ee94000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:369:5266 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:369 state:D stack:0 pid:5266 tgid:5266 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb90dd84 r8:00000002 r7:60000013 r6:eb90dd8c r5:855be000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:00001000 r4:eb76f000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849df38c r4:849df000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849df38c r4:854caf00
r10:61c88647 r9:855be000 r8:854caf2c r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:370:5268 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:370 state:D stack:0 pid:5268 tgid:5268 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb915d84 r8:00000002 r7:60000013 r6:eb915d8c r5:856f8c00
r4:856f8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480a40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb931000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c038c r4:856c0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c038c r4:854cae80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f8c00 r8:854caeac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854cae80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854cae80 r8:80287e08 r7:eb8f1e60 r6:854a5a00 r5:856f8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb915fb0 to 0xeb915ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85480600
INFO: task kworker/0:370:5268 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9f3d8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:371:5270 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:371 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb91dd84 r8:00000002 r7:60000113 r6:eb91dd8c r5:856f8000
r4:856f8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480840
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb869000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849dfb8c r4:849df800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849dfb8c r4:854caf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f8000 r8:854cafac r7:82804d40 r6:dddced80 r5:dddceda0
r4:854caf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854caf80 r8:80287e08 r7:eb915e60 r6:854a5a80 r5:856f8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb91dfb0 to 0xeb91dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85480380
INFO: task kworker/0:371:5270 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9f3d8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:372:5273 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:372 state:D stack:0 pid:5273 tgid:5273 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb939d84 r8:00000002 r7:60000113 r6:eb939d8c r5:856f9800
r4:856f9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb939e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb925000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:849dff8c r4:849dfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:849dff8c r4:85477000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f9800 r8:8547702c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477000 r8:80287e08 r7:eb915e60 r6:854a5b00 r5:856f9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb939fb0 to 0xeb939ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85480740
INFO: task kworker/0:372:5273 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9f68d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:373:5276 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:373 state:D stack:0 pid:5276 tgid:5276 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb955d84 r8:00000002 r7:60000013 r6:eb955d8c r5:856fb000
r4:856fb000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856fb000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb955e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480b80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb941000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c078c r4:856c0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c078c r4:85477080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856fb000 r8:854770ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477080 r8:80287e08 r7:eb915e60 r6:854a5b80 r5:856fb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb955fb0 to 0xeb955ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854807c0
INFO: task kworker/0:373:5276 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9f90c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:374:5277 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:374 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb959d84 r8:00000002 r7:60000113 r6:eb959d8c r5:856fc800
r4:856fc800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856fc800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb959e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480d00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb94d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c0b8c r4:856c0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c0b8c r4:85477100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856fc800 r8:8547712c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477100 r8:80287e08 r7:eb955e60 r6:854a5c00 r5:856fc800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb959fb0 to 0xeb959ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854807c0
INFO: task kworker/0:374:5277 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: 9fba3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:375:5279 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:375 state:D stack:0 pid:5279 tgid:5279 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb965d84 r8:00000002 r7:60000113 r6:eb965d8c r5:856fa400
r4:856fa400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856fa400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480e80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb961000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c0f8c r4:856c0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c0f8c r4:85477180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856fa400 r8:854771ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477180 r8:80287e08 r7:eb959e60 r6:854a5c80 r5:856fa400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb965fb0 to 0xeb965ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85480b00
INFO: task kworker/0:375:5279 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a00b2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:376:5281 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:376 state:D stack:0 pid:5281 tgid:5281 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb975d84 r8:00000002 r7:60000113 r6:eb975d8c r5:856fe000
r4:856fe000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856fe000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480fc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb96d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c138c r4:856c1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c138c r4:85477200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856fe000 r8:8547722c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477200 r8:80287e08 r7:eb965e60 r6:854a5d00 r5:856fe000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb975fb0 to 0xeb975ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85480c80
INFO: task kworker/0:376:5281 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a00b2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:377:5282 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:377 state:D stack:0 pid:5282 tgid:5282 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb981d84 r8:00000002 r7:60000113 r6:eb981d8c r5:856fec00
r4:856fec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856fec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556d680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb98d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c1b8c r4:856c1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c1b8c r4:85477280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856fec00 r8:854772ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477280 r8:80287e08 r7:eb975e60 r6:854a5d80 r5:856fec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb981fb0 to 0xeb981ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85480c80
INFO: task kworker/0:377:5282 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a0319000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:378:5284 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:378 state:D stack:0 pid:5284 tgid:5284 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb991d84 r8:00000002 r7:60000113 r6:eb991d8c r5:856fd400
r4:856fd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856fd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c178c r4:856c1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c178c r4:85477300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856fd400 r8:8547732c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477300 r8:80287e08 r7:eb981e60 r6:854a5e00 r5:856fd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb991fb0 to 0xeb991ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85480e40
INFO: task kworker/0:378:5284 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a057f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:379:5287 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:379 state:D stack:0 pid:5287 tgid:5287 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9a5d84 r8:00000002 r7:60000113 r6:eb9a5d8c r5:85700c00
r4:85700c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85700c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85700c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9e5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c2f8c r4:856c2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c2f8c r4:85477380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85700c00 r8:854773ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477380 r8:80287e08 r7:eb981e60 r6:854a5e80 r5:85700c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9a5fb0 to 0xeb9a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556ddc0
INFO: task kworker/0:379:5287 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a057f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:380:5289 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:380 state:D stack:0 pid:5289 tgid:5289 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9b5d84 r8:00000002 r7:60000113 r6:eb9b5d8c r5:85700000
r4:85700000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85700000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85700000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb99d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c1f8c r4:856c1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c1f8c r4:85477400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85700000 r8:8547742c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477400 r8:80287e08 r7:eb9a5e60 r6:854a5f00 r5:85700000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9b5fb0 to 0xeb9b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461000
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
9d60: 80230ad0 80239bb0 80070113 ffffffff
r4:82ac21e4
r4:eaf29dc0
r4:00000000
r5:00001000 r4:dfd17000
r5:852bd78c r4:852bd400
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:381:5290 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:381 state:D stack:0 pid:5290 tgid:5290 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9c1d84 r8:00000002 r7:60000113 r6:eb9c1d8c r5:85702400
r4:85702400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85702400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461340
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85702400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9ad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c238c r4:856c2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c238c r4:85477480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85702400 r8:854774ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477480 r8:80287e08 r7:eb9a5e60 r6:854a5f80 r5:85702400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9c1fb0 to 0xeb9c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461000
INFO: task kworker/0:381:5290 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a0e5b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:8530ac00
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/0:382:5292 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:382 state:D stack:0 pid:5292 tgid:5292 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9d1d84 r8:00000002 r7:60000013 r6:eb9d1d8c r5:85701800
r4:85701800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85701800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85701800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9bd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c278c r4:856c2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c278c r4:85477500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85701800 r8:8547752c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477500 r8:80287e08 r7:eb9a5e60 r6:85331000 r5:85701800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9d1fb0 to 0xeb9d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461240
INFO: task kworker/0:382:5292 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a10e6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461640
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85703c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c2b8c r4:856c2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c2b8c r4:85477580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85703c00 r8:854775ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477580 r8:80287e08 r7:eb9a5e60 r6:85331080 r5:85703c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9d5fb0 to 0xeb9d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461240
INFO: task kworker/0:383:5294 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a10e6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
r4:eaf29dc0
r5:00001000 r4:dfd17000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Not tainted 6.15.0-rc7-syzkaller #0
r5:85704800 r4:8291a680
r4:00000000
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeb951fb0 to 0xeb951ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a1854000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:384:5299 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:85705400
r5:85705400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854618c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85705400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c338c r4:856c3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c338c r4:85477600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85705400 r8:8547762c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477600 r8:80287e08 r7:eb9a5e60 r6:85331200 r5:85705400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9f1fb0 to 0xeb9f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461540
INFO: task kworker/0:384:5299 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a1854000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:852cfa40
Not tainted 6.15.0-rc7-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r5:85706000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9fde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854baa00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85706000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb88f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8573a38c r4:8573a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8573a38c r4:85477680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85706000 r8:854776ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477680 r8:80287e08 r7:eb9f1e60 r6:85331280 r5:85706000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9fdfb0 to 0xeb9fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854616c0
INFO: task kworker/0:385:5301 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a1b97000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:386:5303 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:386 state:D stack:0 pid:5303 tgid:5303 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb721d84 r8:00000002 r7:60000113 r6:eb721d8c r5:85706c00
r4:85706c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85706c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461b40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85706c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c3b8c r4:856c3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c3b8c r4:85477700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85706c00 r8:8547772c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477700 r8:80287e08 r7:eb9fde60 r6:85331300 r5:85706c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb721fb0 to 0xeb721ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854617c0
INFO: task kworker/0:386:5303 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a1db6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:387:5306 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:387 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7f1d84 r8:00000002 r7:60000113 r6:eb7f1d8c r5:856f0000
r4:856f0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:856f0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461fc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:856f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb23d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c478c r4:856c4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c478c r4:85477780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:856f0000 r8:854777ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477780 r8:80287e08 r7:eb721e60 r6:85331380 r5:856f0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7f1fb0 to 0xeb7f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854613c0
INFO: task kworker/0:387:5306 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a1db6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Not tainted 6.15.0-rc7-syzkaller #0
r10:8291a684 r9:eb7f9d84 r8:00000002 r7:60000113 r6:eb7f9d8c r5:856fbc00
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c3f8c r4:856c3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c3f8c r4:85477800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:854613c0
Workqueue: events bpf_prog_free_deferred
Call trace:
r4:00000000
9d20: a1fbe000 ed8b5000 00000001 80239b98 7f3cf000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:389:5309 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:389 state:D stack:0 pid:5309 tgid:5309 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb819d84 r8:00000002 r7:60000113 r6:eb819d8c r5:85709800
r4:85709800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85709800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85709800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaeaf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c438c r4:856c4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c438c r4:85477880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85709800 r8:854778ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477880
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:699:5312 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:699 state:D stack:0 pid:5312 tgid:5312 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb829d84 r8:00000002 r7:60000013 r6:eb829d8c r5:8570a400
r4:8570a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8570a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8453d4c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8570a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb439000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a5f8c r4:856a5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856a5f8c r4:85331500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8570a400 r8:8533152c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85331500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:390:5314 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:390 state:D stack:0 pid:5314 tgid:5314 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb84dd84 r8:00000002 r7:60000113 r6:eb84dd8c r5:8570b000
r4:8570b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8570b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb84de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477900 r8:80287e08 r7:eb7f1e60 r6:85331600 r5:8570b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb84dfb0 to 0xeb84dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461c40
INFO: task kworker/0:390:5314 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a2721000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:700:5315 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336b00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a578c r4:856a5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeba09fb0 to 0xeba09ff8)
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r5:852bd78c r4:852bd400
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:391:5316 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:391 state:D stack:0 pid:5316 tgid:5316 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba0dd84 r8:00000002 r7:60000113 r6:eba0dd8c r5:8570bc00
r4:8570bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8570bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba0de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8570bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb18d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a5b8c r4:856a5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856a5b8c r4:85477980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8570bc00 r8:854779ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477980 r8:80287e08 r7:eb7f1e60 r6:85331780 r5:8570bc00
Workqueue: events bpf_prog_free_deferred
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:701:5319 blocked for more than 466 seconds.
r4:8570d400
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c538c r4:856c5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a2e9f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:392:5322 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:392 state:D stack:0 pid:5322 tgid:5322 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba1dd84 r8:00000002 r7:60000113 r6:eba1dd8c r5:8570ec00
r4:8570ec00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c678c r4:856c6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:85477a00 r8:80287e08 r7:eb7f1e60 r6:85331900 r5:8570ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba1dfb0 to 0xeba1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461e40
INFO: task kworker/0:392:5322 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a30be000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:393:5323 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:393 state:D stack:0 pid:5323 tgid:5323 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba21d84 r8:00000002 r7:60000113 r6:eba21d8c r5:85708c00
r4:85708c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85708c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba21e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854612c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85708c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb279000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c4b8c r4:856c4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c4b8c r4:85477a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85708c00 r8:85477aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477a80 r8:80287e08 r7:eba1de60 r6:85331980 r5:85708c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba21fb0 to 0xeba21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461d80
INFO: task kworker/0:393:5323 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a338d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:394:5324 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:394 state:D stack:0 pid:5324 tgid:5324 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9b1d84 r8:00000002 r7:60000113 r6:eb9b1d8c r5:846b3000
r4:846b3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846b3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532d0c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:846b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c4f8c r4:856c4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c4f8c r4:85477b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846b3000 r8:85477b2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477b00 r8:80287e08 r7:eba1de60 r6:85477b80 r5:846b3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9b1fb0 to 0xeb9b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461f80
INFO: task kworker/0:394:5324 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a338d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:702:5328 blocked for more than 466 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:702 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:846b3c00
r4:846b3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846b3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853210c0
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a638c r4:856a6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:85331a00
Exception stack(0xeba25fb0 to 0xeba25ff8)
r4:85336a80
Call trace:
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a3794000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:395:5330 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:395 state:D stack:0 pid:5330 tgid:5330 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba29d84 r8:00000002 r7:60000113 r6:eba29d8c r5:846b4800
r4:846b4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846b4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532d400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:846b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c578c r4:856c5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c578c r4:85477c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846b4800 r8:85477cac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477c80 r8:80287e08 r7:eba1de60 r6:85477d00 r5:846b4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba29fb0 to 0xeba29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8532d200
INFO: task kworker/0:395:5330 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a3bf3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:396:5331 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:396 state:D stack:0 pid:5331 tgid:5331 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb879d84 r8:00000002 r7:60000113 r6:eb879d8c r5:846b5400
r4:846b5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846b5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb879e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85479180
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:846b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb847000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c5b8c r4:856c5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c5b8c r4:85477d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846b5400 r8:85477dac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85477d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85477d80 r8:80287e08 r7:eba1de60 r6:85477e00 r5:846b5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb879fb0 to 0xeb879ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8532d200
INFO: task kworker/0:396:5331 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a3f61000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321280
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a678c r4:856a6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856a678c r4:85331a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846b6000 r8:85331aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85331a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85331a80 r8:80287e08 r7:eba25e60 r6:85477e80 r5:846b6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba31fb0 to 0xeba31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853366c0
INFO: task kworker/1:703:5333 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a42be000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r5:852bd78c r4:852bd400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:704 state:D stack:0 pid:5336 tgid:5336 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:00001000 r4:eb603000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a738c r4:856a7000
r7:ddde2d80 r6:83018200 r5:856a738c r4:85331b00
r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r5:80070113 r4:80239bb0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:846b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb485000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a6b8c r4:856a6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856a6b8c r4:85331b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846b6c00 r8:85331bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85331b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85331b80 r8:80287e08 r7:eba3de60 r6:85477f80 r5:846b6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba41fb0 to 0xeba41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85321100
INFO: task kworker/1:705:5337 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a46cc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:706:5339 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:706 state:D stack:0 pid:5339 tgid:5339 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba49d84 r8:00000002 r7:60000013 r6:eba49d8c r5:846b2400
r4:846b2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846b2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a6f8c r4:856a6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856a6f8c r4:85331c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846b2400 r8:85331c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85331c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85331c00 r8:80287e08 r7:eba3de60 r6:8532f000 r5:846b2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba49fb0 to 0xeba49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85321200
INFO: task kworker/1:706:5339 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a4816000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:852cfa40
task:kworker/1:707 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a778c r4:856a7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856a778c r4:85331c80
r4:85331c80
Exception stack(0xeba51fb0 to 0xeba51ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xeaf29d28 to 0xeaf29d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba59e08
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84788c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb669000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a7b8c r4:856a7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856a7b8c r4:85331d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84788c00 r8:85331d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85331d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85331d00 r8:80287e08 r7:eba51e60 r6:8532f100 r5:84788c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba59fb0 to 0xeba59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85321500
INFO: task kworker/1:708:5343 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a4c62000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:709:5345 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:709 state:D stack:0 pid:5345 tgid:5345 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r4:84788000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08
r5:00001000 r4:eb693000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856a7f8c r4:856a7c00
r10:61c88647 r9:84788000 r8:85331dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:852cfa40
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:710 state:D stack:0 pid:5347 tgid:5347 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba69d84 r8:00000002 r7:60000113 r6:eba69d8c r5:84789800
r4:84789800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84789800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321cc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84789800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856b038c r4:856b0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b038c r4:85331e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84789800 r8:85331e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85331e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85331e00 r8:80287e08 r7:eba61e60 r6:8532f200 r5:84789800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba69fb0 to 0xeba69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85321780
INFO: task kworker/1:710:5347 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a502d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
INFO: task kworker/1:711:5349 blocked for more than 467 seconds.
r4:8478bc00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba71e08
r5:00001000 r4:eb6b5000
r5:8444a38c r4:8444a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:85331e80 r8:80287e08 r7:eba69e60 r6:8532f280 r5:8478bc00
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85321900
INFO: task kworker/1:711:5349 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a5779000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854670c0
r5:856b138c r4:856b1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:8478b000 r8:85331f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:713:5353 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:713 state:D stack:0 pid:5353 tgid:5353 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba81d84 r8:00000002 r7:60000113 r6:eba81d8c r5:8478a400
r4:8478a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8478a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8478a400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856b078c r4:856b0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b078c r4:85331f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8478a400 r8:85331fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85331f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85331f80 r8:80287e08 r7:eba79e60 r6:8532f380 r5:8478a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba81fb0 to 0xeba81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85321b40
INFO: task kworker/1:713:5353 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a586c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r4:eaf29dc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:714:5355 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:714 state:D stack:0 pid:5355 tgid:5355 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba89d84 r8:00000002 r7:60000113 r6:eba89d8c r5:8478c800
r4:8478c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8478c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321f40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8478c800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:856b0b8c r4:856b0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:8533e000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r5:8570c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336e40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8570c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856b0f8c r4:856b0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b0f8c r4:8533e080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8570c800 r8:8533e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8533e080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8533e080 r8:80287e08 r7:eba79e60 r6:8533e100 r5:8570c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba2dfb0 to 0xeba2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85336a40
INFO: task kworker/1:715:5357 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a5d1c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r4:8570e000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08
r5:00001000 r4:eb81d000
r5:856b178c r4:856b1400
r7:ddde2d80 r6:83018200 r5:856b178c r4:8533e180
Exception stack(0xeba8dfb0 to 0xeba8dff8)
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a6038000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:717:5362 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:717 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba95d84 r8:00000002 r7:60000113 r6:eba95d8c r5:85710000
r4:85710000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85710000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba95e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85710000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb839000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856b1b8c r4:856b1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b1b8c r4:8533e280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85710000 r8:8533e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8533e280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8533e280 r8:80287e08 r7:eba8de60 r6:8533e300 r5:85710000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba95fb0 to 0xeba95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85467180
INFO: task kworker/1:717:5362 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a6249000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:718:5364 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:718 state:D stack:0 pid:5364 tgid:5364 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:85710c00
r4:85710c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85710c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854678c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85710c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba9f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856b238c r4:856b2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b238c r4:8533e380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85710c00 r8:8533e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8533e380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8533e380 r8:80287e08 r7:eba95e60 r6:8533e400 r5:85710c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba35fb0 to 0xeba35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:eaf29dc0
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
9fa0: 00000000 00000000 00000000 00000000
r4:85712400
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb863000
r5:856b1f8c r4:856b1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b1f8c r4:8533e480
r10:61c88647 r9:85712400 r8:8533e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeba9dfb0 to 0xeba9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85467380
INFO: task kworker/1:719:5366 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a6778000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:720:5370 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:720 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba99d84 r8:00000002 r7:60000113 r6:eba99d8c r5:85713000
r4:85713000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85713000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854679c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85713000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebaab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856b278c r4:856b2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b278c r4:8533e580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85713000 r8:8533e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8533e580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8533e580 r8:80287e08 r7:eba35e60 r6:8533e600 r5:85713000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba99fb0 to 0xeba99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85467700
INFO: task kworker/1:720:5370 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a67ce000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0: 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/1:721 state:D stack:0 pid:5371 tgid:5371 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba91d84 r8:00000002 r7:60000113 r6:eba91d8c r5:85713c00
r4:85713c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85713c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467b80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85713c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebab7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856b2b8c r4:856b2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b2b8c r4:8533e680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85713c00 r8:8533e6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8533e680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8533e680 r8:80287e08 r7:eba99e60 r6:8533e700 r5:85713c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba91fb0 to 0xeba91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854677c0
INFO: task kworker/1:721:5371 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a6b19000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
INFO: task kworker/1:722:5373 blocked for more than 467 seconds.
r5:85714800 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467f00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85714800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebacf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856b338c r4:856b3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b338c r4:8533e780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85714800 r8:8533e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8533e780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8533e780 r8:80287e08 r7:eba91e60 r6:8533e800 r5:85714800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebab5fb0 to 0xebab5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85467ac0
INFO: task kworker/1:722:5373 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a6df8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:723:5375 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:723 state:D stack:0 pid:5375 tgid:5375 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebac1d84 r8:00000002 r7:60000113 r6:ebac1d8c r5:85715400
r4:85715400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85715400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467d00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85715400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebac3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:856b2f8c r4:856b2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b2f8c r4:8533e880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85715400 r8:8533e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8533e880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8533e880 r8:80287e08 r7:ebab5e60 r6:8533e900 r5:85715400
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a71f3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:397:5376 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:397 state:D stack:0 pid:5376 tgid:5376 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebaa9d84 r8:00000002 r7:60000113 r6:ebaa9d8c r5:85716000
r4:85716000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85716000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555e440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85716000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb9d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c638c r4:856c6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c638c r4:8532f480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85716000 r8:8532f4ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8532f480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8532f480 r8:80287e08 r7:eba1de60 r6:8533e980 r5:85716000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaa9fb0 to 0xebaa9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85479440
INFO: task kworker/0:397:5376 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a7486000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:724:5379 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:724 state:D stack:0 pid:5379 tgid:5379 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebacdd84 r8:00000002 r7:60000113 r6:ebacdd8c r5:85716c00
r4:85716c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:856b378c r4:856b3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b378c r4:8533ea00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85716c00 r8:8533ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8533ea00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8533ea00 r8:80287e08 r7:ebab5e60 r6:8533ea80 r5:85716c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebacdfb0 to 0xebacdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85467d80
INFO: task kworker/1:724:5379 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a7486000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r5:85711800 r4:8291a680
r4:00000000
r4:00000000
r5:856b3f8c r4:856b3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b3f8c r4:8533eb00
r10:61c88647 r9:85711800 r8:8533eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a7c1b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08
r5:856b3b8c r4:856b3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856b3b8c r4:8533ec00
r10:61c88647 r9:85703000 r8:8533ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8533ec00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8533ec00 r8:80287e08 r7:ebad9e60 r6:8533ec80 r5:85703000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebae5fb0 to 0xebae5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8532da40
INFO: task kworker/1:726:5382 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a7fb8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:727:5384 blocked for more than 467 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:727 state:D stack:0 pid:5384 tgid:5384 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebaf1d84 r8:00000002 r7:60000113 r6:ebaf1d8c r5:85718000
r4:85718000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85718000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85718000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebaff000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8572c38c r4:8572c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572c38c r4:8533ed00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85718000 r8:8533ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8533ed00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8533ed00 r8:80287e08 r7:ebad9e60 r6:8533ed80 r5:85718000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaf1fb0 to 0xebaf1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85482040
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:00001000 r4:dfd17000
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Call trace:
r4:00000000
r5:8572cb8c r4:8572c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r10:8291a684 r9:eb86dd84 r8:00000002 r7:60000113 r6:eb86dd8c r5:85719800
r5:00001000 r4:dfa77000
r5:8572c78c r4:8572c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:8572cf8c r4:8572cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572cf8c r4:85498000
r10:00000000 r9:85498000 r8:80287e08 r7:ebafde60 r6:85498080 r5:8571a400
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a884a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:731:5391 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:731 state:D stack:0 pid:5391 tgid:5391 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8a1d84 r8:00000002 r7:60000113 r6:eb8a1d8c r5:8571b000
r4:8571b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8571b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8571b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0657000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8572d38c r4:8572d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572d38c r4:85498100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8571b000 r8:8549812c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:732:5394 blocked for more than 468 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:8572d78c r4:8572d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572d78c r4:85498200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:85498200 r8:80287e08 r7:eb8a1e60 r6:85498280 r5:8571bc00
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r5:8572db8c r4:8572d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572db8c r4:85498300
r4:85498300
Exception stack(0xeb8d9fb0 to 0xeb8d9ff8)
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r5:00001000 r4:dfd17000
r4:8530ac00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482f80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8571d400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8572e38c r4:8572e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572e38c r4:85498400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8571d400 r8:8549842c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498400 r8:80287e08 r7:eb8d9e60 r6:85498480 r5:8571d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8e5fb0 to 0xeb8e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85482b00
INFO: task kworker/1:734:5398 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a9568000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
task:kworker/1:735 state:D stack:0 pid:5399 tgid:5399 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacd1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8572df8c r4:8572dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572df8c r4:85498500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8571e000 r8:8549852c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498500 r8:80287e08 r7:eb8e5e60 r6:85498580 r5:8571e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8d1fb0 to 0xeb8d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85482b00
INFO: task kworker/1:735:5399 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a9aeb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace:
r5:8571ec00 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a45c0
r5:8572ef8c r4:8572ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572ef8c r4:85498600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8571ec00 r8:8549862c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498600 r8:80287e08 r7:eb8e5e60 r6:85498680 r5:8571ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb901fb0 to 0xeb901ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85482e00
INFO: task kworker/1:736:5402 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: a9ed4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:737:5403 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:737 state:D stack:0 pid:5403 tgid:5403 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb92dd84 r8:00000002 r7:60000113 r6:eb92dd8c r5:85720000
r4:85720000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85720000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85720000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8572e78c r4:8572e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572e78c r4:85498700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85720000 r8:8549872c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498700 r8:80287e08 r7:eb901e60 r6:85498780 r5:85720000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb92dfb0 to 0xeb92dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a4080
INFO: task kworker/1:737:5403 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: aa727000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:738:5405 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:738 state:D stack:0 pid:5405 tgid:5405 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb93dd84 r8:00000002 r7:60000013 r6:eb93dd8c r5:85721800
r4:85721800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85721800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4480
r9:83018205 r8:85721800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8572eb8c r4:8572e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572eb8c r4:85498800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85721800 r8:8549882c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498800 r8:80287e08 r7:eb901e60 r6:85498880 r5:85721800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb93dfb0 to 0xeb93dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a4080
INFO: task kworker/1:738:5405 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: aa727000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:739:5408 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:739 state:D stack:0 pid:5408 tgid:5408 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb945d84 r8:00000002 r7:60000113 r6:eb945d8c r5:85722400
r4:85722400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85722400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4780
r9:83018205 r8:85722400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb33f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8572f38c r4:8572f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572f38c r4:85498900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85722400 r8:8549892c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498900 r8:80287e08 r7:eb901e60 r6:85498980 r5:85722400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb945fb0 to 0xeb945ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a4180
INFO: task kworker/1:739:5408 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: aaca8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:740:5410 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:740 state:D stack:0 pid:5410 tgid:5410 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb929d84 r8:00000002 r7:60000113 r6:eb929d8c r5:85720c00
r4:85720c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85720c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85720c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb36f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8572f78c r4:8572f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572f78c r4:85498a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85720c00 r8:85498a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498a00 r8:80287e08 r7:eb945e60 r6:85498a80 r5:85720c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb929fb0 to 0xeb929ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a4600
INFO: task kworker/1:740:5410 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ab222000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:741:5413 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:741 state:D stack:0 pid:5413 tgid:5413 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb971d84 r8:00000002 r7:60000113 r6:eb971d8c r5:85723c00
r4:85723c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85723c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4bc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85723c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4e7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8572ff8c r4:8572fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572ff8c r4:85498b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85723c00 r8:85498b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498b00 r8:80287e08 r7:eb929e60 r6:85498b80 r5:85723c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb971fb0 to 0xeb971ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a4680
INFO: task kworker/1:741:5413 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ab5e2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:742:5414 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:742 state:D stack:0 pid:5414 tgid:5414 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:8291a684 r9:eb985d84 r8:00000002 r7:60000113 r6:eb985d8c r5:85724800
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4a00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85724800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8572fb8c r4:8572f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8572fb8c r4:85498c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85724800 r8:85498c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498c00 r8:80287e08 r7:eb971e60 r6:85498c80 r5:85724800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb985fb0 to 0xeb985ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a4680
INFO: task kworker/1:742:5414 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ab5e2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:743:5416 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:743 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:85725400 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4d40
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8573838c r4:85738000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85725400 r8:85498d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498d00 r8:80287e08 r7:eb971e60 r6:85498d80 r5:85725400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb995fb0 to 0xeb995ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a4a40
INFO: task kworker/1:743:5416 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: abb2f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:744:5418 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:744 state:D stack:0 pid:5418 tgid:5418 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:85726000
r4:85726000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85726000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482f00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85726000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb579000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85738b8c r4:85738800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85738b8c r4:85498e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85726000 r8:85498e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498e00 r8:80287e08 r7:eb995e60 r6:85498e80 r5:85726000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9c5fb0 to 0xeb9c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a4c00
INFO: task kworker/1:744:5418 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: abdba000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:745:5419 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:745 state:D stack:0 pid:5419 tgid:5419 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb0dd84 r8:00000002 r7:60000113 r6:ebb0dd8c r5:85726c00
r4:85726c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85726c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4e80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85726c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb547000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8573878c r4:85738400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8573878c r4:85498f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85726c00 r8:85498f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85498f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85498f00 r8:80287e08 r7:eb9c5e60 r6:85498f80 r5:85726c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb0dfb0 to 0xebb0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a4c00
INFO: task kworker/1:745:5419 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ac025000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:746:5421 blocked for more than 468 seconds.
r5:85723000 r4:8291a680
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:8573938c r4:85739000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8573938c r4:854bd000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85723000 r8:854bd02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bd000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bd000 r8:80287e08 r7:eb9c5e60 r6:854bd080 r5:85723000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb11fb0 to 0xebb11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854a4d00
INFO: task kworker/1:746:5421 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ac467000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:747:5424 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:747 state:D stack:0 pid:5424 tgid:5424 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb15d84 r8:00000002 r7:60000013 r6:ebb15d8c r5:85768000
r4:85768000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:85738f8c r4:85738c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85738f8c r4:854bd100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:854bd100 r8:80287e08 r7:ebb11e60 r6:854bd180 r5:85768000
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ac584000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:85739b8c r4:85739800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85739b8c r4:854bd200
r10:00000000 r9:854bd200 r8:80287e08 r7:ebb11e60 r6:854bd280 r5:85768c00
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:749:5427 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:749 state:D stack:0 pid:5427 tgid:5427 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:85769800 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8573978c r4:85739400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8573978c r4:854bd300
r4:854bd300
Exception stack(0xebb1dfb0 to 0xebb1dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854ba100
INFO: task kworker/1:749:5427 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: acbe1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba8c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8576a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb87f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85739f8c r4:85739c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85739f8c r4:854bd400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8576a400 r8:854bd42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bd400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bd400 r8:80287e08 r7:ebb19e60 r6:8532f500 r5:8576a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb21fb0 to 0xebb21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854ba540
INFO: task kworker/1:750:5429 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: accf3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb29d84 r8:00000002 r7:60000013 r6:ebb29d8c r5:8478ec00
r4:8478ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8478ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461880
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8478ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb85b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c5f8c r4:856c5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856c5f8c r4:854bd480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8478ec00 r8:854bd4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bd480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bd480 r8:80287e08 r7:ebb21e60 r6:8532f580 r5:8478ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb29fb0 to 0xebb29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854ba6c0
INFO: task kworker/1:751:5432 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: accf3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bafc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8478e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb903000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8573b38c r4:8573b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8573b38c r4:854bd500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8478e000 r8:854bd52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bd500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bd500 r8:80287e08 r7:ebb21e60 r6:8532f600 r5:8478e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb31fb0 to 0xebb31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854ba740
INFO: task kworker/1:752:5434 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ad3b1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:753:5437 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:753 state:D stack:0 pid:5437 tgid:5437 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb35d84 r8:00000002 r7:60000113 r6:ebb35d8c r5:846b0000
r4:846b0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846b0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb35e08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb8a7000
r5:8573a78c r4:8573a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8573a78c r4:854bd580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846b0000 r8:854bd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bd580
r10:00000000 r9:854bd580 r8:80287e08 r7:ebb31e60 r6:8532f680 r5:846b0000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:754:5439 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:754 state:D stack:0 pid:5439 tgid:5439 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb3dd84 r8:00000002 r7:60000113 r6:ebb3dd8c r5:84ae0c00
r4:84ae0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ae0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bad40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ae0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb8b7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8573ab8c r4:8573a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8573ab8c r4:854bd600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae0c00 r8:854bd62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bd600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bd600 r8:80287e08 r7:ebb31e60 r6:8532f700 r5:84ae0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb3dfb0 to 0xebb3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854ba9c0
INFO: task kworker/1:754:5439 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ad773000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:755:5440 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:755 state:D stack:0 pid:5440 tgid:5440 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb25d84 r8:00000002 r7:60000113 r6:ebb25d8c r5:8576b000
r4:8576b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8576b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb25e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bae40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8576b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb8db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8573af8c r4:8573ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8573af8c r4:854bd680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8576b000 r8:854bd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bd680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bd680 r8:80287e08 r7:ebb31e60 r6:854bd700 r5:8576b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb25fb0 to 0xebb25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854bad80
INFO: task kworker/1:755:5440 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ad773000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:756:5443 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:756 state:D stack:0 pid:5443 tgid:5443 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb39d84 r8:00000002 r7:60000113 r6:ebb39d8c r5:8576c800
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e0c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8576c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb923000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8573bb8c r4:8573b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8573bb8c r4:854bd780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8576c800 r8:854bd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bd780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bd780 r8:80287e08 r7:ebb31e60 r6:854bd800 r5:8576c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb39fb0 to 0xebb39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854badc0
INFO: task kworker/1:756:5443 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ae088000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:757:5444 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:757 state:D stack:0 pid:5444 tgid:5444 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb2dd84 r8:00000002 r7:60000113 r6:ebb2dd8c r5:8576d400
r4:8576d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8576d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8576d400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb917000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8573b78c r4:8573b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8573b78c r4:854bd880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8576d400 r8:854bd8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bd880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bd880 r8:80287e08 r7:ebb39e60 r6:854bd900 r5:8576d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb2dfb0 to 0xebb2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854ba940
INFO: task kworker/1:757:5444 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ae2e6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:758:5447 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:758 state:D stack:0 pid:5447 tgid:5447 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb45d84 r8:00000002 r7:60000013 r6:ebb45d8c r5:8576e000
r4:8576e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8576e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8576e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb95b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574038c r4:85740000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574038c r4:854bd980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8576e000 r8:854bd9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bd980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bd980 r8:80287e08 r7:ebb39e60 r6:854bda00 r5:8576e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb45fb0 to 0xebb45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556e000
INFO: task kworker/1:758:5447 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ae3cd000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:759:5449 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:759 state:D stack:0 pid:5449 tgid:5449 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb4dd84 r8:00000002 r7:60000113 r6:ebb4dd8c r5:8576ec00
r4:8576ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8576ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb4de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8576ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb93f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8573bf8c r4:8573bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8573bf8c r4:854bda80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8576ec00 r8:854bdaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bda80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bda80 r8:80287e08 r7:ebb45e60 r6:854bdb00 r5:8576ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb4dfb0 to 0xebb4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556e180
INFO: task kworker/1:759:5449 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ae932000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:760:5450 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:760 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:8576bc00
r4:8576bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8576bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e640
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8576bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb969000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574078c r4:85740400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574078c r4:854bdb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8576bc00 r8:854bdbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bdb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bdb80 r8:80287e08 r7:ebb45e60 r6:854bdc00 r5:8576bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb51fb0 to 0xebb51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556e3c0
INFO: task kworker/1:760:5450 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ae932000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:761:5454 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:761 state:D stack:0 pid:5454 tgid:5454 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb55d84 r8:00000002 r7:60000013 r6:ebb55d8c r5:85770000
r4:85770000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85770000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb55e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85770000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb97b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85740b8c r4:85740800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85740b8c r4:854bdc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85770000 r8:854bdcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bdc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bdc80 r8:80287e08 r7:ebb51e60 r6:854bdd00 r5:85770000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb55fb0 to 0xebb55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556e4c0
INFO: task kworker/1:761:5454 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ae9df000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:762:5455 blocked for more than 468 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:762 state:D stack:0 pid:5455 tgid:5455 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb59d84 r8:00000002 r7:60000113 r6:ebb59d8c r5:85770c00
r4:85770c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85770c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e880
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85770c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb997000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85740f8c r4:85740c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85740f8c r4:854bdd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85770c00 r8:854bddac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bdd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bdd80 r8:80287e08 r7:ebb55e60 r6:854bde00 r5:85770c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb59fb0 to 0xebb59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556e7c0
INFO: task kworker/1:762:5455 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: af3a5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:763:5457 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:763 state:D stack:0 pid:5457 tgid:5457 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb5dd84 r8:00000002 r7:60000113 r6:ebb5dd8c r5:85771800
r4:85771800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85771800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb5de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556ea40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85771800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574138c r4:85741000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574138c r4:854bde80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85771800 r8:854bdeac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bde80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bde80 r8:80287e08 r7:ebb59e60 r6:854bdf00 r5:85771800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb5dfb0 to 0xebb5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556e540
INFO: task kworker/1:763:5457 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: af3a5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:764:5458 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:764 state:D stack:0 pid:5458 tgid:5458 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb49d84 r8:00000002 r7:60000113 r6:ebb49d8c r5:85772400
r4:85772400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85772400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556ec40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85772400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9b7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574178c r4:85741400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574178c r4:854bdf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85772400 r8:854bdfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:854bdf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:854bdf80 r8:80287e08 r7:ebb5de60 r6:8557c000 r5:85772400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb49fb0 to 0xebb49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556e540
INFO: task kworker/1:764:5458 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: af709000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:765:5461 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:765 state:D stack:0 pid:5461 tgid:5461 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb61d84 r8:00000002 r7:60000013 r6:ebb61d8c r5:85773000
r4:85773000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85773000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856070c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85773000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574278c r4:85742400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574278c r4:8557c080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85773000 r8:8557c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557c080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557c080 r8:80287e08 r7:ebb49e60 r6:8557c100 r5:85773000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb61fb0 to 0xebb61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556eac0
INFO: task kworker/1:765:5461 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: afbb5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:766:5463 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:766 state:D stack:0 pid:5463 tgid:5463 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb69d84 r8:00000002 r7:60000013 r6:ebb69d8c r5:85773c00
r4:85773c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85773c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556edc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85773c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9c9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85741b8c r4:85741800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85741b8c r4:8557c180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85773c00 r8:8557c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557c180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557c180 r8:80287e08 r7:ebb61e60 r6:8557c200 r5:85773c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb69fb0 to 0xebb69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556ebc0
INFO: task kworker/1:766:5463 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: aff5d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:767:5464 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:767 state:D stack:0 pid:5464 tgid:5464 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb6dd84 r8:00000002 r7:60000113 r6:ebb6dd8c r5:85774800
r4:85774800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85774800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb6de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556eec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85774800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85741f8c r4:85741c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85741f8c r4:8557c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85774800 r8:8557c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557c280 r8:80287e08 r7:ebb61e60 r6:8557c300 r5:85774800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb6dfb0 to 0xebb6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556ebc0
INFO: task kworker/1:767:5464 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: aff5d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:768:5466 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:768 state:D stack:0 pid:5466 tgid:5466 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb75d84 r8:00000002 r7:60000113 r6:ebb75d8c r5:84ae2400
r4:84ae2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ae2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb75e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321fc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ae2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9e7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574238c r4:85742000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574238c r4:8557c380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae2400 r8:8557c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557c380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557c380 r8:80287e08 r7:ebb61e60 r6:8532f780 r5:84ae2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb75fb0 to 0xebb75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556ebc0
INFO: task kworker/1:768:5466 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b031e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8291a684 r9:ebb81d84 r8:00000002 r7:60000013 r6:ebb81d8c r5:84ae3000
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856072c0
r5:85743f8c r4:85743c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85743f8c r4:8557c400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae3000 r8:8557c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557c400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557c400 r8:80287e08 r7:ebb61e60 r6:8532f800 r5:84ae3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb81fb0 to 0xebb81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85607000
INFO: task kworker/1:769:5469 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b0567000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:770:5470 blocked for more than 469 seconds.
task:kworker/1:770 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85742b8c r4:85742800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85742b8c r4:8557c480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae1800 r8:8557c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557c480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557c480 r8:80287e08 r7:ebb81e60 r6:8532f880 r5:84ae1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb8dfb0 to 0xebb8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85607000
INFO: task kworker/1:770:5470 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b0567000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r5:84ae0000 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08
r9:83018205 r8:84ae0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
r5:85742f8c r4:85742c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85742f8c r4:8557c500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae0000 r8:8557c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557c500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557c500 r8:80287e08 r7:ebb81e60 r6:8532f900 r5:84ae0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb95fb0 to 0xebb95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85607180
INFO: task kworker/1:771:5472 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b0cb9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8574338c r4:85743000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574338c r4:8557c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85775400 r8:8557c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557c580 r8:80287e08 r7:ebb81e60 r6:8557c600 r5:85775400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb65fb0 to 0xebb65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85607380
INFO: task kworker/1:772:5475 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b12f7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:398:5477 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:398 state:D stack:0 pid:5477 tgid:5477 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbb5d84 r8:00000002 r7:60000113 r6:ebbb5d8c r5:85778000
r4:85778000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85778000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555ed80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85778000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c6b8c r4:856c6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c6b8c r4:8532f980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85778000 r8:8532f9ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8532f980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8532f980 r8:80287e08 r7:eba1de60 r6:8557c680 r5:85778000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbb5fb0 to 0xebbb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555e600
INFO: task kworker/0:398:5477 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b12f7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:399:5478 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:399 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbc5d84 r8:00000002 r7:60000013 r6:ebbc5d8c r5:85779800
r4:85779800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85779800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856484c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85779800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaad1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c7b8c r4:856c7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c7b8c r4:8532fa00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85779800 r8:8532fa2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8532fa00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8532fa00 r8:80287e08 r7:ebbb5e60 r6:8557c700 r5:85779800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbc5fb0 to 0xebbc5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555e040
INFO: task kworker/0:399:5478 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b12f7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
task:kworker/0:400 state:D stack:0 pid:5480 tgid:5480 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648140
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8577a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbbd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c6f8c r4:856c6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c6f8c r4:8532fa80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8577a400 r8:8532faac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8532fa80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8532fa80 r8:80287e08 r7:ebbc5e60 r6:8557c780 r5:8577a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbc9fb0 to 0xebbc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555e040
INFO: task kworker/0:400:5480 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b12f7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0: 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc7-syzkaller #0
r4:85778c00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018005 r8:85778c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
r5:856c778c r4:856c7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c778c r4:8532fb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85778c00 r8:8532fb2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8532fb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8532fb00 r8:80287e08 r7:ebbc5e60 r6:8557c800 r5:85778c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba15fb0 to 0xeba15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85648080
INFO: task kworker/0:401:5481 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b1edf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:8577c800
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672d00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8577c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebaad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856d8b8c r4:856d8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856d8b8c r4:8532fb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8577c800 r8:8532fbac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8532fb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8532fb80 r8:80287e08 r7:ebbc5e60 r6:8557c880 r5:8577c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebabdfb0 to 0xebabdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85648240
INFO: task kworker/0:402:5486 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b1edf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:403:5487 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:403 state:D stack:0 pid:5487 tgid:5487 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebac9d84 r8:00000002 r7:60000113 r6:ebac9d8c r5:8577b000
r4:8577b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8577b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:856c7f8c r4:856c7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c7f8c r4:8532fc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:8532fc00 r8:80287e08 r7:ebabde60 r6:8557c900 r5:8577b000
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b1edf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:8577e000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:84b6978c r4:84b69400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8577e000 r8:8532fcac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8532fc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8532fc80 r8:80287e08 r7:ebabde60 r6:8557c980 r5:8577e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebae1fb0 to 0xebae1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85648440
INFO: task kworker/0:404:5489 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b29d4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:773:5492 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:773 state:D stack:0 pid:5492 tgid:5492 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebad5d84 r8:00000002 r7:60000013 r6:ebad5d8c r5:8577bc00
r4:8577bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8577bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856078c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8577bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb009000
r5:8574378c r4:85743400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574378c r4:8557ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:8557ca00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
Exception stack(0xeaf29d28 to 0xeaf29d70)
r4:82ac21e4
r4:eaf29dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:774:5494 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:774 state:D stack:0 pid:5494 tgid:5494 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebaedd84 r8:00000002 r7:60000013 r6:ebaedd8c r5:8577ec00
r4:8577ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8577ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85607700
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8577ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1f9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85743b8c r4:85743800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85743b8c r4:8557cb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8577ec00 r8:8557cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557cb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557cb00 r8:80287e08 r7:ebb81e60 r6:8557cb80 r5:8577ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaedfb0 to 0xebaedff8)
dfa0: 00000000 00000000 00000000 00000000
r4:85607880
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
r5:80070113 r4:80239bb0
r4:eaf29dc0
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:775:5495 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:775 state:D stack:0 pid:5495 tgid:5495 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb71d84 r8:00000002 r7:60000113 r6:ebb71d8c r5:8577d400
r4:8577d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8577d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8577d400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574c78c r4:8574c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574c78c r4:8557cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8577d400 r8:8557cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557cc00 r8:80287e08 r7:ebb81e60 r6:8557cc80 r5:8577d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb71fb0 to 0xebb71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85607880
INFO: task kworker/1:775:5495 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:776:5497 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:776 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb05d84 r8:00000002 r7:60000113 r6:ebb05d8c r5:85776c00
r4:85776c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85776c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85776c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb39e000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574c38c r4:8574c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574c38c r4:8557cd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85776c00 r8:8557cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557cd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557cd00 r8:80287e08 r7:ebb71e60 r6:8557cd80 r5:85776c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb05fb0 to 0xebb05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85640080
INFO: task kworker/1:776:5497 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b376e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:777:5500 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:777 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebaf9d84 r8:00000002 r7:60000113 r6:ebaf9d8c r5:85776000
r4:85776000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85776000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85776000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb447000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574cb8c r4:8574c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574cb8c r4:8557ce00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85776000 r8:8557ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557ce00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557ce00 r8:80287e08 r7:ebb71e60 r6:8557ce80 r5:85776000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaf9fb0 to 0xebaf9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856402c0
INFO: task kworker/1:777:5500 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b376e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:778:5503 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:778 state:D stack:0 pid:5503 tgid:5503 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbddd84 r8:00000002 r7:60000113 r6:ebbddd8c r5:85780000
r4:85780000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85780000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbdde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85780000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb477000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574cf8c r4:8574cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574cf8c r4:8557cf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85780000 r8:8557cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8557cf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8557cf00 r8:80287e08 r7:ebaf9e60 r6:8557cf80 r5:85780000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbddfb0 to 0xebbddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85640300
INFO: task kworker/1:778:5503 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b3a90000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:779:5505 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:779 state:D stack:0 pid:5505 tgid:5505 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbe1d84 r8:00000002 r7:60000113 r6:ebbe1d8c r5:85780c00
r4:85780c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85780c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640800
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85780c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574d38c r4:8574d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574d38c r4:8564f000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85780c00 r8:8564f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564f000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564f000 r8:80287e08 r7:ebbdde60 r6:8564f080 r5:85780c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe1fb0 to 0xebbe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856405c0
INFO: task kworker/1:779:5505 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b3cdf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:780:5507 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:780 state:D stack:0 pid:5507 tgid:5507 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbe5d84 r8:00000002 r7:60000113 r6:ebbe5d8c r5:85781800
r4:85781800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85781800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85781800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574d78c r4:8574d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574d78c r4:8564f100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85781800 r8:8564f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564f100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564f100 r8:80287e08 r7:ebbe1e60 r6:8564f180 r5:85781800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe5fb0 to 0xebbe5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85640600
INFO: task kworker/1:780:5507 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b433a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:405:5509 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:405 state:D stack:0 pid:5509 tgid:5509 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbe9d84 r8:00000002 r7:60000113 r6:ebbe9d8c r5:85782400
r4:85782400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85782400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85782400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb845000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856c378c r4:856c3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856c378c r4:8532fd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85782400 r8:8532fd2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8532fd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8532fd00 r8:80287e08 r7:ebabde60 r6:8564f200 r5:85782400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe9fb0 to 0xebbe9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85648bc0
INFO: task kworker/0:405:5509 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b4626000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:781:5510 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:781 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbd9d84 r8:00000002 r7:60000113 r6:ebbd9d8c r5:85783000
r4:85783000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85783000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb645000
r5:8574db8c r4:8574d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574db8c r4:8564f280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85783000 r8:8564f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564f280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564f280 r8:80287e08 r7:ebbe5e60 r6:8564f300 r5:85783000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbd9fb0 to 0xebbd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856407c0
INFO: task kworker/1:781:5510 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b48ce000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:782:5511 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:782 state:D stack:0 pid:5511 tgid:5511 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbedd84 r8:00000002 r7:60000013 r6:ebbedd8c r5:85783c00
r4:85783c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85783c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85783c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb707000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574eb8c r4:8574e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574eb8c r4:8564f380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85783c00 r8:8564f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564f380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564f380 r8:80287e08 r7:ebbd9e60 r6:8564f400 r5:85783c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbedfb0 to 0xebbedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85640a80
INFO: task kworker/1:782:5511 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b4db7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0: 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc7-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574df8c r4:8574dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574df8c r4:8564f480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85784800 r8:8564f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564f480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564f480 r8:80287e08 r7:ebbede60 r6:8564f500 r5:85784800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbf1fb0 to 0xebbf1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85640b80
INFO: task kworker/1:783:5514 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b53cd000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
r4:852cfa40
task:kworker/1:784 state:D stack:0 pid:5516 tgid:5516 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbf5d84 r8:00000002 r7:60000013 r6:ebbf5d8c r5:85785400
r4:85785400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85785400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640e80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85785400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574e38c r4:8574e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574e38c r4:8564f580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85785400 r8:8564f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564f580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564f580 r8:80287e08 r7:ebbede60 r6:8564f600 r5:85785400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbf5fb0 to 0xebbf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85640c80
INFO: task kworker/1:784:5516 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b53cd000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r5:85786000 r4:8291a680
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640fc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85786000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574e78c r4:8574e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574e78c r4:8564f680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85786000 r8:8564f6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564f680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564f680 r8:80287e08 r7:ebbede60 r6:8564f700 r5:85786000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbf9fb0 to 0xebbf9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85640e40
INFO: task kworker/1:785:5518 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b58d6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r4:eaf29dc0
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:786 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbfde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85786c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574ef8c r4:8574ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574ef8c r4:8564f780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85786c00 r8:8564f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564f780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564f780 r8:80287e08 r7:ebbede60 r6:8564f800 r5:85786c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbfdfb0 to 0xebbfdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85662000
INFO: task kworker/1:786:5520 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b5c80000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:787:5521 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:787 state:D stack:0 pid:5521 tgid:5521 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc05d84 r8:00000002 r7:60000013 r6:ebc05d8c r5:85788000
r4:85788000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85788000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc05e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85788000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb803000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574f38c r4:8574f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574f38c r4:8564f880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85788000 r8:8564f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564f880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564f880 r8:80287e08 r7:ebbfde60 r6:8564f900 r5:85788000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc05fb0 to 0xebc05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85662000
INFO: task kworker/1:787:5521 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b6192000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:788:5524 blocked for more than 469 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:788 state:D stack:0 pid:5524 tgid:5524 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc01d84 r8:00000002 r7:60000113 r6:ebc01d8c r5:85788c00
r4:85788c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85788c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856625c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85788c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb81b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574f78c r4:8574f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574f78c r4:8564fa00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85788c00 r8:8564fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564fa00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564fa00 r8:80287e08 r7:ebc05e60 r6:8564fa80 r5:85788c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc01fb0 to 0xebc01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856623c0
INFO: task kworker/1:788:5524 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b63f8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:789:5526 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:789 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc0dd84 r8:00000002 r7:60000013 r6:ebc0dd8c r5:85789800
r4:85789800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85789800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc0de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662800
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85789800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb82f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574fb8c r4:8574f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574fb8c r4:8564f980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85789800 r8:8564f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564f980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564f980 r8:80287e08 r7:ebc01e60 r6:8564fb00 r5:85789800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc0dfb0 to 0xebc0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85662440
INFO: task kworker/1:789:5526 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b6761000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:790:5527 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:790 state:D stack:0 pid:5527 tgid:5527 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc11d84 r8:00000002 r7:60000113 r6:ebc11d8c r5:8578a400
r4:8578a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8578a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662cc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8578a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba55000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575c38c r4:8575c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575c38c r4:8564fb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8578a400 r8:8564fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564fb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564fb80 r8:80287e08 r7:ebc0de60 r6:8564fc00 r5:8578a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc11fb0 to 0xebc11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85662680
INFO: task kworker/1:790:5527 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b69f1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:791:5530 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:791 state:D stack:0 pid:5530 tgid:5530 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc15d84 r8:00000002 r7:60000113 r6:ebc15d8c r5:84ae6000
r4:84ae6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ae6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc15e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662bc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba45000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8574ff8c r4:8574fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8574ff8c r4:8564fc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae6000 r8:8564fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564fc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564fc80 r8:80287e08 r7:ebc11e60 r6:8532fd80 r5:84ae6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc15fb0 to 0xebc15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85662780
INFO: task kworker/1:791:5530 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b6c6d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:406:5531 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:406 state:D stack:0 pid:5531 tgid:5531 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc19d84 r8:00000002 r7:60000113 r6:ebc19d8c r5:84ae4800
r4:84ae4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ae4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc19e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ae4800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb865000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856d838c r4:856d8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856d838c r4:8532fe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae4800 r8:8532fe2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8532fe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8532fe00 r8:80287e08 r7:ebabde60 r6:8532fe80 r5:84ae4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc19fb0 to 0xebc19ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85672140
INFO: task kworker/0:406:5531 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b6eb2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:407:5533 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:407 state:D stack:0 pid:5533 tgid:5533 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc09d84 r8:00000002 r7:60000113 r6:ebc09d8c r5:84ae6c00
r4:84ae6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ae6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856724c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ae6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba19000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856d878c r4:856d8400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856d878c r4:8532ff00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae6c00 r8:8532ff2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8532ff00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8532ff00 r8:80287e08 r7:ebabde60 r6:8532ff80 r5:84ae6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc09fb0 to 0xebc09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85672140
INFO: task kworker/0:407:5533 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b711b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:408:5536 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:408 state:D stack:0 pid:5536 tgid:5536 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc25d84 r8:00000002 r7:60000113 r6:ebc25d8c r5:84ae3c00
r4:84ae3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ae3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845ee840
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ae3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e08b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856d978c r4:856d9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856d978c r4:8566f000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae3c00 r8:8566f02c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8566f000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566f000 r8:80287e08 r7:ebabde60 r6:8566f080 r5:84ae3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc25fb0 to 0xebc25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85672440
INFO: task kworker/0:408:5536 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b736b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:792:5538 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:792 state:D stack:0 pid:5538 tgid:5538 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc2dd84 r8:00000002 r7:60000113 r6:ebc2dd8c r5:84b98000
r4:84b98000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b98000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc2de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b98000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575c78c r4:8575c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575c78c r4:8564fd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b98000 r8:8564fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564fd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564fd00 r8:80287e08 r7:ebc11e60 r6:8566f100 r5:84b98000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc2dfb0 to 0xebc2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85662ac0
INFO: task kworker/1:792:5538 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b74b8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:793:5540 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:793 state:D stack:0 pid:5540 tgid:5540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc35d84 r8:00000002 r7:60000113 r6:ebc35d8c r5:84b99800
r4:84b99800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b99800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc35e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648c00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b99800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebadd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575cf8c r4:8575cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575cf8c r4:8564fe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b99800 r8:8564fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564fe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564fe00 r8:80287e08 r7:ebc2de60 r6:8566f180 r5:84b99800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc35fb0 to 0xebc35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85662b40
INFO: task kworker/1:793:5540 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b7954000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:794:5541 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:794 state:D stack:0 pid:5541 tgid:5541 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc39d84 r8:00000002 r7:60000113 r6:ebc39d8c r5:84b9a400
r4:84b9a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b9a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662d40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba7d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575cb8c r4:8575c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575cb8c r4:8564fd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b9a400 r8:8564fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564fd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564fd80 r8:80287e08 r7:ebc35e60 r6:8566f200 r5:84b9a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc39fb0 to 0xebc39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85662b40
INFO: task kworker/1:794:5541 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b7bd4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:795:5543 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:795 state:D stack:0 pid:5543 tgid:5543 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc41d84 r8:00000002 r7:60000113 r6:ebc41d8c r5:84b98c00
r4:84b98c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b98c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc41e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856627c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbd1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575d38c r4:8575d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575d38c r4:8564fe80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b98c00 r8:8564feac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564fe80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564fe80 r8:80287e08 r7:ebc35e60 r6:8566f280 r5:84b98c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc41fb0 to 0xebc41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85662d80
INFO: task kworker/1:795:5543 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b7f19000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:409:5545 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:409 state:D stack:0 pid:5545 tgid:5545 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc3dd84 r8:00000002 r7:60000113 r6:ebc3dd8c r5:84b9bc00
r4:84b9bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b9bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc3de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845ee800
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84b9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebc71000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856d8f8c r4:856d8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856d8f8c r4:8566f300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b9bc00 r8:8566f32c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8566f300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566f300 r8:80287e08 r7:ebc25e60 r6:8566f380 r5:84b9bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc3dfb0 to 0xebc3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85672b80
INFO: task kworker/0:409:5545 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b83ed000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:796:5548 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:796 state:D stack:0 pid:5548 tgid:5548 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc59d84 r8:00000002 r7:60000013 r6:ebc59d8c r5:84b9c800
r4:84b9c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b9c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676140
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebc61000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575db8c r4:8575d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575db8c r4:8564ff80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b9c800 r8:8564ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8564ff80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8564ff80 r8:80287e08 r7:ebc41e60 r6:8566f400 r5:84b9c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc59fb0 to 0xebc59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85607c40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebc4d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575d78c r4:8575d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575d78c r4:8566e000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b9e000 r8:8566e02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e000 r8:80287e08 r7:ebc59e60 r6:8566f480 r5:84b9e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc5dfb0 to 0xebc5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8556efc0
INFO: task kworker/1:797:5549 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b87fc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:798:5551 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:798 state:D stack:0 pid:5551 tgid:5551 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc69d84 r8:00000002 r7:60000113 r6:ebc69d8c r5:84b9d400
r4:84b9d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b9d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676d00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb117000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575eb8c r4:8575e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575eb8c r4:8566e080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b9d400 r8:8566e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e080 r8:80287e08 r7:ebc59e60 r6:8566f500 r5:84b9d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc69fb0 to 0xebc69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85662900
INFO: task kworker/1:798:5551 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b8b69000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:799:5553 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:799 state:D stack:0 pid:5553 tgid:5553 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc21d84 r8:00000002 r7:60000013 r6:ebc21d8c r5:8578c800
r4:8578c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8578c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc21e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8578c800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa9f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575df8c r4:8575dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575df8c r4:8566e100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8578c800 r8:8566e12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e100 r8:80287e08 r7:ebc69e60 r6:8566e180 r5:8578c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc21fb0 to 0xebc21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85676080
INFO: task kworker/1:799:5553 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b93a9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:800:5556 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:800 state:D stack:0 pid:5556 tgid:5556 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc1dd84 r8:00000002 r7:60000013 r6:ebc1dd8c r5:8578e000
r4:8578e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8578e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc1de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8578e000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcd9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575e38c r4:8575e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575e38c r4:8566e200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8578e000 r8:8566e22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e200 r8:80287e08 r7:ebc69e60 r6:8566e280 r5:8578e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc1dfb0 to 0xebc1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85676400
INFO: task kworker/1:800:5556 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b93a9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:801:5558 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:801 state:D stack:0 pid:5558 tgid:5558 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb79d84 r8:00000002 r7:60000013 r6:ebb79d8c r5:8578d400
r4:8578d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8578d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8578d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac73000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575e78c r4:8575e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575e78c r4:8566e300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8578d400 r8:8566e32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e300 r8:80287e08 r7:ebc69e60 r6:8566e380 r5:8578d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb79fb0 to 0xebb79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85676200
INFO: task kworker/1:801:5558 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b9ab9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:410:5560 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:410 state:D stack:0 pid:5560 tgid:5560 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc89d84 r8:00000002 r7:60000113 r6:ebc89d8c r5:8578b000
r4:8578b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8578b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc89e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8578b000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856d9f8c r4:856d9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856d9f8c r4:8566f580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8578b000 r8:8566f5ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8566f580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566f580 r8:80287e08 r7:ebc25e60 r6:8566e400 r5:8578b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc89fb0 to 0xebc89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845ee7c0
INFO: task kworker/0:410:5560 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: b9d4e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:411:5562 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:411 state:D stack:0 pid:5562 tgid:5562 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc8dd84 r8:00000002 r7:60000113 r6:ebc8dd8c r5:8578bc00
r4:8578bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8578bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc8de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8578bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae2f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856d9b8c r4:856d9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856d9b8c r4:8566f600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8578bc00 r8:8566f62c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8566f600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566f600 r8:80287e08 r7:ebc89e60 r6:8566e480 r5:8578bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc8dfb0 to 0xebc8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845ee7c0
INFO: task kworker/0:411:5562 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ba3a6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:802:5563 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:802 state:D stack:0 pid:5563 tgid:5563 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc75d84 r8:00000002 r7:60000113 r6:ebc75d8c r5:84b9ec00
r4:84b9ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b9ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b9ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575ef8c r4:8575ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575ef8c r4:8566e500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b9ec00 r8:8566e52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e500 r8:80287e08 r7:ebc69e60 r6:8566f680 r5:84b9ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc75fb0 to 0xebc75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85676680
INFO: task kworker/1:802:5563 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ba4ed000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:412:5566 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:412 state:D stack:0 pid:5566 tgid:5566 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc85d84 r8:00000002 r7:60000113 r6:ebc85d8c r5:84b9b000
r4:84b9b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b9b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc85e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84b9b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb98b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856da38c r4:856da000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856da38c r4:8566f700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b9b000 r8:8566f72c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8566f700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566f700 r8:80287e08 r7:ebc89e60 r6:8566f780 r5:84b9b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc85fb0 to 0xebc85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
INFO: task kworker/0:412:5566 is blocked on a mutex likely owned by task kworker/1:426:4465.
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ba67b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:413:5567 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:413 state:D stack:0 pid:5567 tgid:5567 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc91d84 r8:00000002 r7:60000113 r6:ebc91d8c r5:8478d400
r4:8478d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8478d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc91e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671f80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8478d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb977000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8576338c r4:85763000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8576338c r4:8566f800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8478d400 r8:8566f82c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8566f800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566f800 r8:80287e08 r7:ebc85e60 r6:8566f880 r5:8478d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc91fb0 to 0xebc91ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:82ac21e4
r4:eaf29dc0
r5:00001000 r4:dfd17000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8575f38c r4:8575f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575f38c r4:8566e580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:849b8c00 r8:8566e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e580 r8:80287e08 r7:ebc75e60 r6:8566f900 r5:849b8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc9dfb0 to 0xebc9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85676c40
INFO: task kworker/1:803:5571 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bad54000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:804:5572 blocked for more than 470 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:804 state:D stack:0 pid:5572 tgid:5572 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebca1d84 r8:00000002 r7:60000113 r6:ebca1d8c r5:849b9800
r4:849b9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:849b9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r4:00000000
r5:00001000 r4:eb4cf000
r5:8575f78c r4:8575f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575f78c r4:8566e600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:849b9800 r8:8566e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e600 r8:80287e08 r7:ebc9de60 r6:8566f980 r5:849b9800
1fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85676d80
INFO: task kworker/1:804:5572 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bad54000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:805:5574 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:805 state:D stack:0 pid:5574 tgid:5574 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebca5d84 r8:00000002 r7:60000113 r6:ebca5d8c r5:849ba400
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca5e08
r5:85760f8c r4:85760c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:8566e680
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:82ac21e4
r4:eaf29dc0
r5:00001000 r4:dfd17000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcade08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:849bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb50b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8575fb8c r4:8575f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575fb8c r4:8566e700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:849bbc00 r8:8566e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e700 r8:80287e08 r7:ebca5e60 r6:8566fa80 r5:849bbc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcadfb0 to 0xebcadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85666000
INFO: task kworker/1:806:5576 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bb459000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:807:5578 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:807 state:D stack:0 pid:5578 tgid:5578 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcb5d84 r8:00000002 r7:60000113 r6:ebcb5d8c r5:849bb000
r4:849bb000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:849bb000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08
r9:83018205 r8:849bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
r5:8575ff8c r4:8575fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8575ff8c r4:8566e780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:849bb000 r8:8566e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e780 r8:80287e08 r7:ebca5e60 r6:8566fb00 r5:849bb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcb5fb0 to 0xebcb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85666000
INFO: task kworker/1:807:5578 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bb58e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:808:5580 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:808 state:D stack:0 pid:5580 tgid:5580 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcbdd84 r8:00000002 r7:60000113 r6:ebcbdd8c r5:849bc800
r4:849bc800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:849bc800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcbde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:849bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb587000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8576038c r4:85760000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8576038c r4:8566e800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:849bc800 r8:8566e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e800 r8:80287e08 r7:ebca5e60 r6:8566fb80 r5:849bc800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcbdfb0 to 0xebcbdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85666240
INFO: task kworker/1:808:5580 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bbb7a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:809:5582 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:809 state:D stack:0 pid:5582 tgid:5582 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcc5d84 r8:00000002 r7:60000113 r6:ebcc5d8c r5:849bd400
r4:849bd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:849bd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:849bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb743000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8576078c r4:85760400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8576078c r4:8566e880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:849bd400 r8:8566e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e880 r8:80287e08 r7:ebca5e60 r6:8566fc00 r5:849bd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcc5fb0 to 0xebcc5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85666280
INFO: task kworker/1:809:5582 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bbc87000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:810:5584 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:810 state:D stack:0 pid:5584 tgid:5584 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc99d84 r8:00000002 r7:60000113 r6:ebc99d8c r5:85791800
r4:85791800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85791800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc99e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856666c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85791800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb777000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85760b8c r4:85760800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85760b8c r4:8566e900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85791800 r8:8566e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566e900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566e900 r8:80287e08 r7:ebca5e60 r6:8566e980 r5:85791800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc99fb0 to 0xebc99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85666380
INFO: task kworker/1:810:5584 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bc70d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:811:5588 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:811 state:D stack:0 pid:5588 tgid:5588 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcc9d84 r8:00000002 r7:60000113 r6:ebcc9d8c r5:85792400
r4:85792400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85792400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85792400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb871000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8576138c r4:85761000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8576138c r4:8566ea00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85792400 r8:8566ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566ea00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566ea00 r8:80287e08 r7:ebca5e60 r6:8566ea80 r5:85792400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcc9fb0 to 0xebcc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85666680
INFO: task kworker/1:811:5588 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bcc34000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:812:5590 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:812 state:D stack:0 pid:5590 tgid:5590 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcd1d84 r8:00000002 r7:60000113 r6:ebcd1d8c r5:85793000
r4:85793000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85793000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666a80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85793000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb891000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8576178c r4:85761400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8576178c r4:8566eb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85793000 r8:8566eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566eb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566eb00 r8:80287e08 r7:ebcc9e60 r6:8566eb80 r5:85793000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcd1fb0 to 0xebcd1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856667c0
INFO: task kworker/1:812:5590 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bcf85000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:813:5591 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:813 state:D stack:0 pid:5591 tgid:5591 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcd5d84 r8:00000002 r7:60000013 r6:ebcd5d8c r5:85793c00
r4:85793c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85793c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666c80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85793c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb8af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85761b8c r4:85761800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85761b8c r4:8566ec00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85793c00 r8:8566ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566ec00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566ec00 r8:80287e08 r7:ebcd1e60 r6:8566ec80 r5:85793c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcd5fb0 to 0xebcd5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856667c0
INFO: task kworker/1:813:5591 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bd1bb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:814:5593 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:814 state:D stack:0 pid:5593 tgid:5593 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcd9d84 r8:00000002 r7:60000013 r6:ebcd9d8c r5:85794800
r4:85794800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85794800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85794800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb8c9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85761f8c r4:85761c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85761f8c r4:8566ed00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85794800 r8:8566ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566ed00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566ed00 r8:80287e08 r7:ebcd5e60 r6:8566ed80 r5:85794800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcd9fb0 to 0xebcd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85666b00
INFO: task kworker/1:814:5593 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bd40e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:815:5595 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:815 state:D stack:0 pid:5595 tgid:5595 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcddd84 r8:00000002 r7:60000013 r6:ebcddd8c r5:85795400
r4:85795400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85795400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcdde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666f80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85795400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb905000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8576238c r4:85762000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8576238c r4:8566ee00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85795400 r8:8566ee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566ee00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566ee00 r8:80287e08 r7:ebcd9e60 r6:8566ee80 r5:85795400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcddfb0 to 0xebcddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85666c40
INFO: task kworker/1:815:5595 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d60: 80230ad0 80239bb0 80070113 ffffffff
r4:eaf29dc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:816:5597 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:816 state:D stack:0 pid:5597 tgid:5597 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebce1d84 r8:00000002 r7:60000113 r6:ebce1d8c r5:85796000
r4:85796000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85796000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85796000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb91f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8576278c r4:85762400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8576278c r4:8566ef00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85796000 r8:8566ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8566ef00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566ef00 r8:80287e08 r7:ebcdde60 r6:8566ef80 r5:85796000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebce1fb0 to 0xebce1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85676a40
INFO: task kworker/1:816:5597 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bd6d1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85763f8c r4:85763c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xeaf29d28 to 0xeaf29d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:818:5601 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:818 state:D stack:0 pid:5601 tgid:5601 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcedd84 r8:00000002 r7:60000013 r6:ebcedd8c r5:849bec00
r4:849bec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:849bec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:849bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb935000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85762b8c r4:85762800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85762b8c r4:857ab000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:849bec00 r8:857ab02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab000 r8:80287e08 r7:ebce9e60 r6:8566fd00 r5:849bec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcedfb0 to 0xebcedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ae100
INFO: task kworker/1:818:5601 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bddc1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae340
r5:85762f8c r4:85762c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:849b8000 r8:857ab0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: be0ba000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:820:5604 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:820 state:D stack:0 pid:5604 tgid:5604 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:84ae5400
r4:84ae5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ae5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ae5400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9a7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8576378c r4:85763400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8576378c r4:857ab100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ae5400 r8:857ab12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab100 r8:80287e08 r7:ebce9e60 r6:8566fe00 r5:84ae5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcf5fb0 to 0xebcf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ae300
INFO: task kworker/1:820:5604 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: be23f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:414:5606 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:414 state:D stack:0 pid:5606 tgid:5606 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebce5d84 r8:00000002 r7:60000113 r6:ebce5d8c r5:85798000
r4:85798000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85798000 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce5e08
r5:858b778c r4:858b7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b778c r4:8566fe80
r10:61c88647 r9:85798000 r8:8566feac r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r4:00000000
9d20: be652000 ed8b5000 00000001 80239b98 7f3cf000 00000001
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:8530ac00
r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r5:85798c00 r4:8291a680
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856dab8c r4:856da800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856dab8c r4:8566ff80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85798c00 r8:8566ffac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8566ff80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8566ff80 r8:80287e08 r7:ebce5e60 r6:857b2000 r5:85798c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc81fb0 to 0xebc81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857af080
INFO: task kworker/0:415:5608 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: be767000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:821:5611 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:821 state:D stack:0 pid:5611 tgid:5611 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd05d84 r8:00000002 r7:60000013 r6:ebd05d8c r5:8579b000
r4:8579b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8579b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd05e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8579b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9bb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85763b8c r4:85763800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85763b8c r4:857ab180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8579b000 r8:857ab1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
9d60: 80230ad0 80239bb0 80070113 ffffffff
r4:eaf29dc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:852cfa40
task:kworker/1:822 state:D stack:0 pid:5613 tgid:5613 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd0dd84 r8:00000002 r7:60000113 r6:ebd0dd8c r5:8579bc00
r4:8579bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8579bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd0de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aea00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8579bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e038c r4:857e0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e038c r4:857ab200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8579bc00 r8:857ab22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab200 r8:80287e08 r7:ebce9e60 r6:857b2100 r5:8579bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd0dfb0 to 0xebd0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ae700
INFO: task kworker/1:822:5613 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bec41000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e0f8c r4:857e0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e0f8c r4:857ab280
r10:00000000 r9:857ab280 r8:80287e08 r7:ebd0de60 r6:857b2180 r5:8579a400
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r5:852bd78c r4:852bd400
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:824:5617 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:824 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd1dd84 r8:00000002 r7:60000113 r6:ebd1dd8c r5:8579c800
r4:8579c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8579c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd1de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aeb00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8579c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9f9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e078c r4:857e0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e078c r4:857ab300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8579c800 r8:857ab32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab300 r8:80287e08 r7:ebd15e60 r6:857b2200 r5:8579c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd1dfb0 to 0xebd1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ae900
INFO: task kworker/1:824:5617 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bf0e7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:825:5618 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:825 state:D stack:0 pid:5618 tgid:5618 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd21d84 r8:00000002 r7:60000013 r6:ebd21d8c r5:8579d400
r4:8579d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8579d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd21e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aec80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8579d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb41000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e0b8c r4:857e0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e0b8c r4:857ab380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8579d400 r8:857ab3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab380 r8:80287e08 r7:ebd15e60 r6:857b2280 r5:8579d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd21fb0 to 0xebd21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ae900
INFO: task kworker/1:825:5618 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bf200000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:826:5620 blocked for more than 471 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:826 state:D stack:0 pid:5620 tgid:5620 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd2dd84 r8:00000002 r7:60000113 r6:ebd2dd8c r5:84ab0000
r4:84ab0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ab0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd2de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bb300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ab0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebd4b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e238c r4:857e2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e238c r4:857ab400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ab0000 r8:857ab42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab400 r8:80287e08 r7:ebd15e60 r6:857b2300 r5:84ab0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd2dfb0 to 0xebd2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r4:00000000
r5:00001000 r4:dfd17000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:827:5622 blocked for more than 472 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd31d84 r8:00000002 r7:60000013 r6:ebd31d8c r5:84ab0c00
r4:84ab0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ab0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd31e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aef00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ab0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb9b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e138c r4:857e1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e138c r4:857ab480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ab0c00 r8:857ab4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab480 r8:80287e08 r7:ebd2de60 r6:857b2380 r5:84ab0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd31fb0 to 0xebd31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857aec40
INFO: task kworker/1:827:5622 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bf6d2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:828:5624 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:828 state:D stack:0 pid:5624 tgid:5624 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd39d84 r8:00000002 r7:60000113 r6:ebd39d8c r5:84ab2400
r4:84ab2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ab2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd39e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ab2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebba7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e178c r4:857e1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e178c r4:857ab500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ab2400 r8:857ab52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab500 r8:80287e08 r7:ebd2de60 r6:857b2400 r5:84ab2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd39fb0 to 0xebd39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857aef40
INFO: task kworker/1:828:5624 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bf903000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:829:5627 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:829 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd45d84 r8:00000002 r7:60000113 r6:ebd45d8c r5:84ab4800
r4:84ab4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ab4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd45e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666f00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ab4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbb1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e1b8c r4:857e1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e1b8c r4:857ab580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ab4800 r8:857ab5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab580 r8:80287e08 r7:ebd2de60 r6:857b2480 r5:84ab4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd45fb0 to 0xebd45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85666e00
INFO: task kworker/1:829:5627 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bfb6d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:830:5629 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:830 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcf9d84 r8:00000002 r7:60000013 r6:ebcf9d8c r5:85790c00
r4:85790c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85790c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bb040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85790c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbcb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e1f8c r4:857e1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e1f8c r4:857ab600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85790c00 r8:857ab62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab600 r8:80287e08 r7:ebd2de60 r6:857ab680 r5:85790c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcf9fb0 to 0xebcf9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857bb080
INFO: task kworker/1:830:5629 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: bfd8e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:831:5630 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:831 state:D stack:0 pid:5630 tgid:5630 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcfdd84 r8:00000002 r7:60000113 r6:ebcfdd8c r5:85796c00
r4:85796c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85796c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcfde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bb640
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85796c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebd57000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e278c r4:857e2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e278c r4:857ab700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85796c00 r8:857ab72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab700 r8:80287e08 r7:ebd2de60 r6:857ab780 r5:85796c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcfdfb0 to 0xebcfdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857bb2c0
INFO: task kworker/1:831:5630 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c070a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:832:5632 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:832 state:D stack:0 pid:5632 tgid:5632 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd55d84 r8:00000002 r7:60000113 r6:ebd55d8c r5:8578ec00
r4:8578ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8578ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd55e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bb800
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8578ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e2b8c r4:857e2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e2b8c r4:857ab800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8578ec00 r8:857ab82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab800 r8:80287e08 r7:ebcfde60 r6:857ab880 r5:8578ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd55fb0 to 0xebd55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857bb180
INFO: task kworker/1:832:5632 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c0b40000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:833:5634 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:833 state:D stack:0 pid:5634 tgid:5634 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba75d84 r8:00000002 r7:60000113 r6:eba75d8c r5:85818c00
r4:85818c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85818c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bb900
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85818c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0797000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e2f8c r4:857e2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e2f8c r4:857ab900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85818c00 r8:857ab92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857ab900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857ab900 r8:80287e08 r7:ebd55e60 r6:857ab980 r5:85818c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba75fb0 to 0xeba75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857bb240
INFO: task kworker/1:833:5634 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c0c70000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bba40
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:ddde2d80 r6:83018200 r5:857e338c r4:857aba00
r4:857aba00
r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857bb700
INFO: task kworker/1:834:5637 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c0d6e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:835:5639 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:835 state:D stack:0 pid:5639 tgid:5639 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc45d84 r8:00000002 r7:60000013 r6:ebc45d8c r5:8581a400
r4:8581a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8581a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc45e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bbec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8581a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb215000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e3f8c r4:857e3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e3f8c r4:857abb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8581a400 r8:857abb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857abb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857abb00 r8:80287e08 r7:ebd49e60 r6:857abb80 r5:8581a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc45fb0 to 0xebc45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857bb8c0
INFO: task kworker/1:835:5639 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c12da000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:836:5641 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:836 state:D stack:0 pid:5641 tgid:5641 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc49d84 r8:00000002 r7:60000113 r6:ebc49d8c r5:8581b000
r4:8581b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8581b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc49e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bbc00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8581b000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaed7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e378c r4:857e3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e378c r4:857abc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8581b000 r8:857abc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857abc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857abc00 r8:80287e08 r7:ebc45e60 r6:857abc80 r5:8581b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc49fb0 to 0xebc49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857bba80
INFO: task kworker/1:836:5641 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c153d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:837:5643 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:837 state:D stack:0 pid:5643 tgid:5643 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebc51d84 r8:00000002 r7:60000013 r6:ebc51d8c r5:8581bc00
r4:8581bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8581bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bbd40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8581bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb021000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e3b8c r4:857e3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e3b8c r4:857abd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8581bc00 r8:857abd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857abd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857abd00 r8:80287e08 r7:ebc45e60 r6:857abd80 r5:8581bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc51fb0 to 0xebc51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857bbb80
INFO: task kworker/1:837:5643 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c18ab000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:838:5645 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:838 state:D stack:0 pid:5645 tgid:5645 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd61d84 r8:00000002 r7:60000113 r6:ebd61d8c r5:8581c800
r4:8581c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8581c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd61e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8581c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb381000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e438c r4:857e4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e438c r4:857abe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8581c800 r8:857abe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857abe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857abe00 r8:80287e08 r7:ebc45e60 r6:857abe80 r5:8581c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd61fb0 to 0xebd61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857bbcc0
INFO: task kworker/1:838:5645 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c18ab000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:839:5647 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:839 state:D stack:0 pid:5647 tgid:5647 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd65d84 r8:00000002 r7:60000113 r6:ebd65d8c r5:8581d400
r4:8581d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8581d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd65e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8581d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb411000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e478c r4:857e4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e478c r4:857abf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8581d400 r8:857abf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857abf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857abf00 r8:80287e08 r7:ebd61e60 r6:857abf80 r5:8581d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd65fb0 to 0xebd65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857bbe40
INFO: task kworker/1:839:5647 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c1c9f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:840:5648 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:840 state:D stack:0 pid:5648 tgid:5648 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd69d84 r8:00000002 r7:60000113 r6:ebd69d8c r5:8581e000
r4:8581e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8581e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd69e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cea00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8581e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e5b8c r4:857e5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e5b8c r4:857d0000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8581e000 r8:857d002c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0000 r8:80287e08 r7:ebd65e60 r6:857d0080 r5:8581e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd69fb0 to 0xebd69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ce000
INFO: task kworker/1:840:5648 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c1e31000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:841:5651 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:841 state:D stack:0 pid:5651 tgid:5651 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebaa5d84 r8:00000002 r7:60000113 r6:ebaa5d8c r5:84ab5400
r4:84ab5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ab5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ab5400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb461000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e4b8c r4:857e4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e4b8c r4:857d0100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ab5400 r8:857d012c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0100 r8:80287e08 r7:ebd69e60 r6:857b2500 r5:84ab5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaa5fb0 to 0xebaa5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ce280
INFO: task kworker/1:841:5651 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c1fde000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:842:5653 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:842 state:D stack:0 pid:5653 tgid:5653 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd6dd84 r8:00000002 r7:60000113 r6:ebd6dd8c r5:84ab3000
r4:84ab3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ab3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd6de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ab3000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb615000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e4f8c r4:857e4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e4f8c r4:857d0180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ab3000 r8:857d01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0180 r8:80287e08 r7:ebd69e60 r6:857b2580 r5:84ab3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd6dfb0 to 0xebd6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ce200
INFO: task kworker/1:842:5653 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c2270000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:416:5655 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:416 state:D stack:0 pid:5655 tgid:5655 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd75d84 r8:00000002 r7:60000113 r6:ebd75d8c r5:84ab6000
r4:84ab6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ab6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd75e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d2b00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ab6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856daf8c r4:856dac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856daf8c r4:857b2600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ab6000 r8:857b262c r7:82804d40 r6:dddced80 r5:dddceda0
r4:857b2600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857b2600 r8:80287e08 r7:ebce5e60 r6:857b2680 r5:84ab6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd75fb0 to 0xebd75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845ee9c0
INFO: task kworker/0:416:5655 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c2373000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:843:5658 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:843 state:D stack:0 pid:5658 tgid:5658 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd79d84 r8:00000002 r7:60000113 r6:ebd79d8c r5:84ab6c00
r4:84ab6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ab6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd79e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ab6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb66d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e538c r4:857e5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e538c r4:857d0200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ab6c00 r8:857d022c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0200 r8:80287e08 r7:ebd69e60 r6:857b2700 r5:84ab6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd79fb0 to 0xebd79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ce400
INFO: task kworker/1:843:5658 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c2373000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:844:5659 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:844 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd7dd84 r8:00000002 r7:60000113 r6:ebd7dd8c r5:84ab3c00
r4:84ab3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ab3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd7de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce900
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ab3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6c5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e578c r4:857e5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e578c r4:857d0280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ab3c00 r8:857d02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0280 r8:80287e08 r7:ebd69e60 r6:857b2780 r5:84ab3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd7dfb0 to 0xebd7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ce400
INFO: task kworker/1:844:5659 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c2985000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:845:5663 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:845 state:D stack:0 pid:5663 tgid:5663 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd8dd84 r8:00000002 r7:60000013 r6:ebd8dd8c r5:85799800
r4:85799800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85799800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd8de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ceb00
r5:00001000 r4:eb729000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
r4:82ac21e4
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:846:5664 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:846 state:D stack:0 pid:5664 tgid:5664 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd91d84 r8:00000002 r7:60000013 r6:ebd91d8c r5:8579ec00
r4:8579ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8579ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd91e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cedc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8579ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb82b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e678c r4:857e6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e678c r4:857d0380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8579ec00 r8:857d03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0380 r8:80287e08 r7:ebd8de60 r6:857b2880 r5:8579ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd91fb0 to 0xebd91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ceb40
INFO: task kworker/1:846:5664 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c2a6f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
r4:eaf29dc0
r5:852bd78c r4:852bd400
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb805000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e638c r4:857e6000
r7:ddde2d80 r6:83018200 r5:857e638c r4:857d0400
r10:00000000 r9:857d0400 r8:80287e08 r7:ebd91e60 r6:857d0480 r5:8581ec00
INFO: task kworker/1:847:5665 is blocked on a mutex likely owned by task kworker/1:426:4465.
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c308d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:848:5669 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:848 state:D stack:0 pid:5669 tgid:5669 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd89d84 r8:00000002 r7:60000113 r6:ebd89d8c r5:85818000
r4:85818000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85818000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd89e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cef00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85818000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb843000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e6b8c r4:857e6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e6b8c r4:857d0500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85818000 r8:857d052c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0500 r8:80287e08 r7:ebd91e60 r6:857d0580 r5:85818000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd89fb0 to 0xebd89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857cec40
INFO: task kworker/1:848:5669 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c31c7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce240
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85790000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb867000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e6f8c r4:857e6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e6f8c r4:857d0600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85790000 r8:857d062c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0600 r8:80287e08 r7:ebd89e60 r6:857d0680 r5:85790000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd81fb0 to 0xebd81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857cec40
INFO: task kworker/1:849:5670 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c33f5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:850:5672 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:850 state:D stack:0 pid:5672 tgid:5672 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd9dd84 r8:00000002 r7:60000113 r6:ebd9dd8c r5:85820000
r4:85820000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85820000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd9de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85820000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba39000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e738c r4:857e7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e738c r4:857d0700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85820000 r8:857d072c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0700 r8:80287e08 r7:ebd81e60 r6:857d0780 r5:85820000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd9dfb0 to 0xebd9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857ced80
INFO: task kworker/1:850:5672 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c35d9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:851:5674 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:851 state:D stack:0 pid:5674 tgid:5674 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebda9d84 r8:00000002 r7:60000013 r6:ebda9d8c r5:84640c00
r4:84640c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84640c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebda9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84640c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba53000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e778c r4:857e7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e778c r4:857d0800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84640c00 r8:857d082c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0800 r8:80287e08 r7:ebd9de60 r6:857b2900 r5:84640c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebda9fb0 to 0xebda9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:858150c0
INFO: task kworker/1:851:5674 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c36ac000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:852:5675 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:852 state:D stack:0 pid:5675 tgid:5675 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebdadd84 r8:00000002 r7:60000013 r6:ebdadd8c r5:84642400
r4:84642400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84642400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdade08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d2ec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84642400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbbf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856db78c r4:856db400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:856db78c r4:857d0880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84642400 r8:857d08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0880 r8:80287e08 r7:ebda9e60 r6:857b2980 r5:84642400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdadfb0 to 0xebdadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85815180
INFO: task kworker/1:852:5675 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c3c80000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:853:5677 blocked for more than 472 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:853 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebdb1d84 r8:00000002 r7:60000113 r6:ebdb1d8c r5:84643000
r4:84643000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84643000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84643000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba6b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e7b8c r4:857e7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857e7b8c r4:857d0900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84643000 r8:857d092c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0900 r8:80287e08 r7:ebdade60 r6:857b2a00 r5:84643000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdb1fb0 to 0xebdb1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85815280
INFO: task kworker/1:853:5677 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c40f4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:417:5680 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:417 state:D stack:0 pid:5680 tgid:5680 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebda5d84 r8:00000002 r7:60000113 r6:ebda5d8c r5:84643c00
r4:84643c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84643c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebda5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815600
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84643c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebab9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857e7f8c r4:857e7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:857e7f8c r4:857b2a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84643c00 r8:857b2aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:857b2a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857b2a80 r8:80287e08 r7:ebce5e60 r6:857b2b00 r5:84643c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebda5fb0 to 0xebda5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857d2980
INFO: task kworker/0:417:5680 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c40f4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
r5:84644800 r4:8291a680
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815900
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ec38c r4:857ec000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ec38c r4:857d0980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84644800 r8:857d09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0980 r8:80287e08 r7:ebdade60 r6:857b2b80 r5:84644800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebda1fb0 to 0xebda1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85815580
INFO: task kworker/1:854:5682 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c40f4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:418:5683 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:418 state:D stack:0 pid:5683 tgid:5683 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:84645400
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb5e08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d2dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84645400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebaf5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856db38c r4:856db000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856db38c r4:857b2c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84645400 r8:857b2c2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:857b2c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857b2c00 r8:80287e08 r7:ebce5e60 r6:857b2c80 r5:84645400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdb5fb0 to 0xebdb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857d2ac0
INFO: task kworker/0:418:5683 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c4419000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Not tainted 6.15.0-rc7-syzkaller #0
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd99e08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591c780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84646000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae67000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:856dbf8c r4:856dbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:856dbf8c r4:857b2d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84646000 r8:857b2d2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:857b2d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857b2d00 r8:80287e08 r7:ebce5e60 r6:857b2d80 r5:84646000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd99fb0 to 0xebd99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:857d2e00
INFO: task kworker/0:419:5686 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c4757000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:855:5688 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:855 state:D stack:0 pid:5688 tgid:5688 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebdc1d84 r8:00000002 r7:60000113 r6:ebdc1d8c r5:84641800
r4:84641800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84641800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815a00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84641800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebc4b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ec78c r4:857ec400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ec78c r4:857d0a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84641800 r8:857d0a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0a00
r10:00000000 r9:857d0a00 r8:80287e08 r7:ebda1e60 r6:857b2e00 r5:84641800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
r5:80070113 r4:80239bb0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r5:00001000 r4:dfd17000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:856:5690 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:856 state:D stack:0 pid:5690 tgid:5690 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebdc9d84 r8:00000002 r7:60000113 r6:ebdc9d8c r5:8579e000
r4:8579e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8579e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815b40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8579e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebc63000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ecb8c r4:857ec800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ecb8c r4:857d0a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8579e000 r8:857d0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0a80 r8:80287e08 r7:ebdc1e60 r6:857b2e80 r5:8579e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdc9fb0 to 0xebdc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85815800
INFO: task kworker/1:856:5690 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c4a56000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:857:5692 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:857 state:D stack:0 pid:5692 tgid:5692 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:84ab1800
r5:84ab1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ab1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebddf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ed38c r4:857ed000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ed38c r4:857d0b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ab1800 r8:857d0b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0b00 r8:80287e08 r7:ebdc9e60 r6:857b2f00 r5:84ab1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdd1fb0 to 0xebdd1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85815c00
INFO: task kworker/1:857:5692 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c4d4d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:858:5693 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:858 state:D stack:0 pid:5693 tgid:5693 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r4:84640000
r5:84640000 r4:8291a680
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815c80
r5:00001000 r4:ebc6f000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ecf8c r4:857ecc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ecf8c r4:857d0c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84640000 r8:857d0c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0c00 r8:80287e08 r7:ebdd1e60 r6:857b2f80 r5:84640000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdd5fb0 to 0xebdd5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85815c00
INFO: task kworker/1:858:5693 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c4d4d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:859:5695 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:859 state:D stack:0 pid:5695 tgid:5695 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebdddd84 r8:00000002 r7:60000113 r6:ebdddd8c r5:858c8c00
r4:858c8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858c8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebddde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858155c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebdfb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857edb8c r4:857ed800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857edb8c r4:857d0b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858c8c00 r8:857d0bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0b80 r8:80287e08 r7:ebdd1e60 r6:85858000 r5:858c8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdddfb0 to 0xebdddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85815a40
INFO: task kworker/1:859:5695 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c538d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:860:5697 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:860 state:D stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebdedd84 r8:00000002 r7:60000113 r6:ebdedd8c r5:858c8000
r4:858c8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858c8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815f40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebdef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ed78c r4:857ed400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ed78c r4:857d0c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858c8000 r8:857d0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0c80 r8:80287e08 r7:ebddde60 r6:85858080 r5:858c8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdedfb0 to 0xebdedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85815bc0
INFO: task kworker/1:860:5697 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c5628000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:861:5700 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:861 state:D stack:0 pid:5700 tgid:5700 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebe09d84 r8:00000002 r7:60000113 r6:ebe09d8c r5:858cb000
r4:858cb000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858cb000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe09e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862180
r5:00001000 r4:ebe37000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857eeb8c r4:857ee800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857eeb8c r4:857d0d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858cb000 r8:857d0d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0d00 r8:80287e08 r7:ebddde60 r6:85858100 r5:858cb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe09fb0 to 0xebe09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85815bc0
INFO: task kworker/1:861:5700 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c5b06000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:862:5701 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:862 state:D stack:0 pid:5701 tgid:5701 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebe15d84 r8:00000002 r7:60000113 r6:ebe15d8c r5:858ca400
r4:858ca400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858ca400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe15e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d2440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857edf8c r4:857edc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857edf8c r4:857d0d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:857d0d80
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
9d20: c5b06000 ed8b5000 00000001 80239b98 7f3cf000 00000001
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:863:5703 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:863 state:D stack:0 pid:5703 tgid:5703 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebe1dd84 r8:00000002 r7:60000013 r6:ebe1dd8c r5:858cc800
r4:858cc800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858cc800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe1de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe1f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ee38c r4:857ee000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ee38c r4:857d0e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858cc800 r8:857d0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0e00 r8:80287e08 r7:ebe09e60 r6:85858200 r5:858cc800
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:864:5705 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:864 state:D stack:0 pid:5705 tgid:5705 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb9e08
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ee78c r4:857ee400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ee78c r4:857d0e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85820c00 r8:857d0eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0e80 r8:80287e08 r7:ebe09e60 r6:857d0f00 r5:85820c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdb9fb0 to 0xebdb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85676940
INFO: task kworker/1:864:5705 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c5fef000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:865:5708 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862300
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857eef8c r4:857eec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857eef8c r4:857d0f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85822400 r8:857d0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:857d0f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:857d0f80 r8:80287e08 r7:ebe09e60 r6:85864000 r5:85822400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe29fb0 to 0xebe29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:858620c0
INFO: task kworker/1:865:5708 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c63cf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc7-syzkaller #0
r4:85823000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe35e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862580
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85823000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe5f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ef78c r4:857ef400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ef78c r4:85864080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85823000 r8:858640ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864080 r8:80287e08 r7:ebe29e60 r6:85858280 r5:85823000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe35fb0 to 0xebe35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85862100
INFO: task kworker/1:866:5710 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c63cf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:867 state:D stack:0 pid:5711 tgid:5711 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ef38c r4:857ef000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ef38c r4:85864100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858cd400 r8:8586412c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864100 r8:80287e08 r7:ebe35e60 r6:85858300 r5:858cd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe5dfb0 to 0xebe5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85862100
INFO: task kworker/1:867:5711 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c6830000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:868:5714 blocked for more than 473 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858626c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe6b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857efb8c r4:857ef800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857efb8c r4:85864180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858ce000 r8:858641ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864180 r8:80287e08 r7:ebe35e60 r6:85858380 r5:858ce000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe75fb0 to 0xebe75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85862380
INFO: task kworker/1:868:5714 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c6abd000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:869:5716 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:869 state:D stack:0 pid:5716 tgid:5716 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebe79d84 r8:00000002 r7:60000113 r6:ebe79d8c r5:858c9800
r4:858c9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858c9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe79e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe87000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f038c r4:857f0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f038c r4:85864200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858c9800 r8:8586422c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864200 r8:80287e08 r7:ebe75e60 r6:85858400 r5:858c9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe79fb0 to 0xebe79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:858625c0
INFO: task kworker/1:869:5716 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c6da1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:870:5719 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:870 state:D stack:0 pid:5719 tgid:5719 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:84646c00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r5:857eff8c r4:857efc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857eff8c r4:85864280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84646c00 r8:858642ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864280 r8:80287e08 r7:ebe79e60 r6:85858480 r5:84646c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe95fb0 to 0xebe95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85862700
INFO: task kworker/1:870:5719 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c6da1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:871:5720 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:871 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebe99d84 r8:00000002 r7:60000113 r6:ebe99d8c r5:84670000
r4:84670000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe99e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862c00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84670000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebea7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f0b8c r4:857f0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f0b8c r4:85864300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84670000 r8:8586432c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864300 r8:80287e08 r7:ebe79e60 r6:85858500 r5:84670000
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
r4:eaf29dc0
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:857f078c r4:857f0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:85864380 r8:80287e08 r7:ebe99e60 r6:85858580 r5:84670c00
r4:00000000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Workqueue: events bpf_prog_free_deferred
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeb5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84671800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0709000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f1f8c r4:857f1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f1f8c r4:85864400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84671800 r8:8586442c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864400 r8:80287e08 r7:ebe99e60 r6:85858600 r5:84671800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebeb5fb0 to 0xebeb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
task:kworker/1:874 state:D stack:0 pid:5725 tgid:5725 ppid:2 task_flags:0x4208060 flags:0x00000000
r9:83018205 r8:84672400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
r7:ddde2d80 r6:83018200 r5:857f0f8c r4:85864480
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
r4:00000000
r4:8530ac00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r5:84673000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862f00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84673000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebec3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f138c r4:857f1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f138c r4:85864500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84673000 r8:8586452c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864500 r8:80287e08 r7:ebeb5e60 r6:85858700 r5:84673000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebed1fb0 to 0xebed1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85862e40
INFO: task kworker/1:875:5727 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c7844000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:dfd17000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:876:5729 blocked for more than 473 seconds.
r4:84674800
r5:84674800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84674800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfac9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f178c r4:857f1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f178c r4:85864580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84674800 r8:858645ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864580 r8:80287e08 r7:ebeb5e60 r6:85858780 r5:84674800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebed9fb0 to 0xebed9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85862d00
INFO: task kworker/1:876:5729 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c7c94000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:877:5731 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:877 state:D stack:0 pid:5731 tgid:5731 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebcc1d84 r8:00000002 r7:60000113 r6:ebcc1d8c r5:84675400
r4:84675400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84675400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:dfd73000
r5:857f1b8c r4:857f1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f1b8c r4:85864600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84675400 r8:8586462c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864600 r8:80287e08 r7:ebeb5e60 r6:85858800 r5:84675400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcc1fb0 to 0xebcc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85872040
INFO: task kworker/1:877:5731 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c7c94000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:84676000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd01e08
r4:00000000
r5:857f278c r4:857f2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f278c r4:85864680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84676000 r8:858646ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864680 r8:80287e08 r7:ebeb5e60 r6:85858880 r5:84676000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd01fb0 to 0xebd01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85872040
INFO: task kworker/1:878:5733 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c8128000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:879 state:D stack:0 pid:5736 tgid:5736 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebed5d84 r8:00000002 r7:60000013 r6:ebed5d8c r5:85824800
r4:85824800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85824800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85824800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac59000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f238c r4:857f2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f238c r4:85864700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85824800 r8:8586472c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864700 r8:80287e08 r7:ebd01e60 r6:85864780 r5:85824800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebed5fb0 to 0xebed5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:858722c0
INFO: task kworker/1:879:5736 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:00000000
r5:852bd78c r4:852bd400
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebdbdd84 r8:00000002 r7:60000113 r6:ebdbdd8c r5:85826c00
r4:85826c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85826c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdbde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85826c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f2b8c r4:857f2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f2b8c r4:85864800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85826c00 r8:8586482c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864800 r8:80287e08 r7:ebd01e60 r6:85864880 r5:85826c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdbdfb0 to 0xebdbdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:858722c0
INFO: task kworker/1:880:5737 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c8643000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:881:5741 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:881 state:D stack:0 pid:5741 tgid:5741 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd3dd84 r8:00000002 r7:60000113 r6:ebd3dd8c r5:85826000
r4:85826000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85826000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd3de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872880
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85826000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2f1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f2f8c r4:857f2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f2f8c r4:85864900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85826000 r8:8586492c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864900 r8:80287e08 r7:ebdbde60 r6:85864980 r5:85826000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd3dfb0 to 0xebd3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:858725c0
INFO: task kworker/1:881:5741 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c8685000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:882:5742 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:882 state:D stack:0 pid:5742 tgid:5742 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd5dd84 r8:00000002 r7:60000113 r6:ebd5dd8c r5:85825400
r4:85825400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85825400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd5de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872a40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85825400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f338c r4:857f3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f338c r4:85864a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85825400 r8:85864a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864a00 r8:80287e08 r7:ebd3de60 r6:85864a80 r5:85825400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd5dfb0 to 0xebd5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85872700
INFO: task kworker/1:882:5742 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c8a74000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:883:5745 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:883 state:D stack:0 pid:5745 tgid:5745 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebeddd84 r8:00000002 r7:60000013 r6:ebeddd8c r5:85823c00
r4:85823c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85823c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebedde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872b80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85823c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f378c r4:857f3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f378c r4:85864b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85823c00 r8:85864b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864b00 r8:80287e08 r7:ebd5de60 r6:85864b80 r5:85823c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebeddfb0 to 0xebeddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:858728c0
INFO: task kworker/1:883:5745 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c8d1d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:884:5746 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:884 state:D stack:0 pid:5746 tgid:5746 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebee1d84 r8:00000002 r7:60000113 r6:ebee1d8c r5:85821800
r4:85821800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85821800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebee1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872ec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85821800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb593000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f3f8c r4:857f3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f3f8c r4:85864c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85821800 r8:85864c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864c00 r8:80287e08 r7:ebedde60 r6:85864c80 r5:85821800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebee1fb0 to 0xebee1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85872a00
INFO: task kworker/1:884:5746 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c8f14000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:885:5748 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:885 state:D stack:0 pid:5748 tgid:5748 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebee5d84 r8:00000002 r7:60000113 r6:ebee5d8c r5:85828000
r4:85828000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85828000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebee5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872d40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85828000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb52f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857f3b8c r4:857f3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857f3b8c r4:85864d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85828000 r8:85864d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864d00 r8:80287e08 r7:ebee1e60 r6:85864d80 r5:85828000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebee5fb0 to 0xebee5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85872c80
INFO: task kworker/1:885:5748 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c8f14000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:886:5750 blocked for more than 473 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:886 state:D stack:0 pid:5750 tgid:5750 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebee9d84 r8:00000002 r7:60000113 r6:ebee9d8c r5:85828c00
r4:85828c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85828c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebee9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845eeac0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85828c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb767000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857fc38c r4:857fc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fc38c r4:85864e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85828c00 r8:85864e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864e00 r8:80287e08 r7:ebee1e60 r6:85864e80 r5:85828c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebee9fb0 to 0xebee9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85872e00
INFO: task kworker/1:886:5750 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c9564000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:887:5752 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:887 state:D stack:0 pid:5752 tgid:5752 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebeedd84 r8:00000002 r7:60000113 r6:ebeedd8c r5:85829800
r4:85829800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85829800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862fc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85829800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7a9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857fc78c r4:857fc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fc78c r4:85864f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85829800 r8:85864f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85864f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85864f00 r8:80287e08 r7:ebee9e60 r6:85864f80 r5:85829800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebeedfb0 to 0xebeedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85872e40
INFO: task kworker/1:887:5752 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c9564000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:888:5753 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:888 state:D stack:0 pid:5753 tgid:5753 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebd51d84 r8:00000002 r7:60000113 r6:ebd51d8c r5:8582a400
r4:8582a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8582a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd51e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8582a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb881000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857fcb8c r4:857fc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fcb8c r4:85887000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8582a400 r8:8588702c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887000 r8:80287e08 r7:ebeede60 r6:85887080 r5:8582a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd51fb0 to 0xebd51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85872e40
INFO: task kworker/1:888:5753 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c982e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:852cfa40
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace:
r4:8582b000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r4:00000000
r5:00001000 r4:eb899000
r5:857fcf8c r4:857fcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fcf8c r4:85887100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8582b000 r8:8588712c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887100 r8:80287e08 r7:ebd51e60 r6:85887180 r5:8582b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebef1fb0 to 0xebef1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85889080
INFO: task kworker/1:889:5756 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c982e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:890:5758 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:890 state:D stack:0 pid:5758 tgid:5758 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebf05d84 r8:00000002 r7:60000113 r6:ebf05d8c r5:858cec00
r4:858cec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858cec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf05e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb8c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857fd38c r4:857fd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fd38c r4:85887200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858cec00 r8:8588722c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887200 r8:80287e08 r7:ebef1e60 r6:85858900 r5:858cec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf05fb0 to 0xebf05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:858891c0
INFO: task kworker/1:890:5758 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c9b70000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:891:5760 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:891 state:D stack:0 pid:5760 tgid:5760 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebf0dd84 r8:00000002 r7:60000013 r6:ebf0dd8c r5:84673c00
r4:84673c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84673c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf0de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858895c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84673c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb90f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857fd78c r4:857fd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fd78c r4:85887280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84673c00 r8:858872ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887280 r8:80287e08 r7:ebf05e60 r6:85858980 r5:84673c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf0dfb0 to 0xebf0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85889240
INFO: task kworker/1:891:5760 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: c9c94000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf11e08
r5:857fdb8c r4:857fd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fdb8c r4:85887300
Exception stack(0xebf11fb0 to 0xebf11ff8)
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:8580038c r4:85800000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ca2c8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:894:5765 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:894 state:D stack:0 pid:5765 tgid:5765 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebf21d84 r8:00000002 r7:60000113 r6:ebf21d8c r5:8464a400
r4:8464a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8464a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r4:00000000
r5:857fdf8c r4:857fdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fdf8c r4:85887400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8464a400 r8:8588742c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fa0: 00000000 00000000 00000000 00000000
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ca58b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:895:5767 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:895 state:D stack:0 pid:5767 tgid:5767 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebf29d84 r8:00000002 r7:60000113 r6:ebf29d8c r5:84649800
r4:84649800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84649800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf29e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84649800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb979000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857fe38c r4:857fe000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fe38c r4:85887480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84649800 r8:858874ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:85887480 r8:80287e08 r7:ebf19e60 r6:85858b80 r5:84649800
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:852bd78c r4:852bd400
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
r5:84648000 r4:8291a680
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:857fe78c r4:857fe400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fe78c r4:85887500
r10:61c88647 r9:84648000 r8:8588752c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: caa99000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:897:5771 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:897 state:D stack:0 pid:5771 tgid:5771 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebf39d84 r8:00000002 r7:60000013 r6:ebf39d8c r5:8464b000
r4:8464b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8464b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf39e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889c00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8464b000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9b9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857feb8c r4:857fe800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857feb8c r4:85887580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8464b000 r8:858875ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887580 r8:80287e08 r7:ebf19e60 r6:85858c80 r5:8464b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf39fb0 to 0xebf39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85889940
INFO: task kworker/1:897:5771 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cacbc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8291a684 r9:ebf41d84 r8:00000002 r7:60000113 r6:ebf41d8c r5:8464bc00
r4:00000000
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ff38c r4:857ff000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:8464bc00 r8:8588762c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: caf07000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:899:5776 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:899 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebf49d84 r8:00000002 r7:60000113 r6:ebf49d8c r5:8464d400
r4:8464d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8464d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf49e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889f00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8464d400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857ff78c r4:857ff400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857ff78c r4:85887680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8464d400 r8:858876ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fa0: 00000000 00000000 00000000 00000000
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r5:8464c800 r4:8291a680
r4:00000000
r4:00000000
r5:00001000 r4:ebb87000
r5:857ffb8c r4:857ff800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cb45c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:901:5780 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:901 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebf61d84 r8:00000002 r7:60000013 r6:ebf61d8c r5:8464e000
r4:8464e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8464e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf61e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859160c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8464e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebba1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:857fff8c r4:857ffc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:857fff8c r4:85887780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8464e000 r8:858877ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:85887780 r8:80287e08 r7:ebf19e60 r6:85858e80 r5:8464e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf61fb0 to 0xebf61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85916040
INFO: task kworker/1:901:5780 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cb83a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:902:5783 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:902 state:D stack:0 pid:5783 tgid:5783 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebf91d84 r8:00000002 r7:60000113 r6:ebf91d8c r5:858d8c00
r4:858d8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858d8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf91e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85916800
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebccd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580138c r4:85801000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580138c r4:85887800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858d8c00 r8:8588782c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887800 r8:80287e08 r7:ebf19e60 r6:85858f00 r5:858d8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r4:858da400
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf99e08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8580078c r4:85800400
r7:ddde2d80 r6:83018200 r5:8580078c r4:85887880
r10:61c88647 r9:858da400 r8:858878ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887880 r8:80287e08 r7:ebf91e60 r6:85858f80 r5:858da400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf99fb0 to 0xebf99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85916280
INFO: task kworker/1:903:5785 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cc7fc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:85800b8c r4:85800800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85800b8c r4:85887900
r4:85887900
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:00001000 r4:ebcb1000
r5:85800f8c r4:85800c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85800f8c r4:85887980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858d9800 r8:858879ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887980 r8:80287e08 r7:ebf91e60 r6:85925080 r5:858d9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfa5fb0 to 0xebfa5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85916380
INFO: task kworker/1:905:5788 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ccab7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
INFO: task kworker/1:906:5790 blocked for more than 474 seconds.
r4:858dc800
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfb5e08
r4:00000000
r5:85801b8c r4:85801800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85801b8c r4:85887a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858dc800 r8:85887a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ccfb5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:907:5792 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:907 state:D stack:0 pid:5792 tgid:5792 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebfadd84 r8:00000002 r7:60000113 r6:ebfadd8c r5:858dbc00
r4:858dbc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858dbc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfade08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8580178c r4:85801400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580178c r4:85887a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:85887a80
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:908:5794 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:908 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebfc1d84 r8:00000002 r7:60000113 r6:ebfc1d8c r5:858db000
r4:858db000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858db000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfc1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85916c00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858db000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebd41000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:85801f8c r4:85801c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85801f8c r4:85887b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858db000 r8:85887b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887b00 r8:80287e08 r7:ebfb5e60 r6:85925200 r5:858db000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfc1fb0 to 0xebfc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:859167c0
INFO: task kworker/1:908:5794 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cd570000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
r5:00001000 r4:dfd17000
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:858dec00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfcde08
r4:00000000
r5:8580238c r4:85802000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580238c r4:85887b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858dec00 r8:85887bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:85887b80 r8:80287e08 r7:ebfc1e60 r6:85925280 r5:858dec00
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cd83c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:858dd400
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfd1e08
r9:83018205 r8:858dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
r5:8580338c r4:85803000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580338c r4:85887c00
r10:61c88647 r9:858dd400 r8:85887c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:85887c00 r8:80287e08 r7:ebfcde60 r6:85925300 r5:858dd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfd1fb0 to 0xebfd1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85916cc0
INFO: task kworker/1:910:5798 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cd9d5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:911:5800 blocked for more than 474 seconds.
r10:8291a684 r9:ebde9d84 r8:00000002 r7:60000013 r6:ebde9d8c r5:858de000
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85916ec0
r5:8580278c r4:85802400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580278c r4:85887c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858de000 r8:85887cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887c80
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:912:5802 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:912 state:D stack:0 pid:5802 tgid:5802 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebfbdd84 r8:00000002 r7:60000013 r6:ebfbdd8c r5:8582c800
r4:8582c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8582c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfbde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587b440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8582c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb249000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85802b8c r4:85802800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85802b8c r4:85887d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8582c800 r8:85887d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887d00 r8:80287e08 r7:ebfd1e60 r6:85887d80 r5:8582c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfbdfb0 to 0xebfbdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85916c80
INFO: task kworker/1:912:5802 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cdec1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:420:5804 blocked for more than 474 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:420 state:D stack:0 pid:5804 tgid:5804 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebdf5d84 r8:00000002 r7:60000113 r6:ebdf5d8c r5:8464ec00
r4:8464ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8464ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf5e08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:84b6a78c r4:84b6a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b6a78c r4:85925400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8464ec00 r8:8592542c r7:82804d40 r6:dddced80 r5:dddceda0
5fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8591cd40
INFO: task kworker/0:420:5804 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ce0de000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
r4:852cfa40
Workqueue: events bpf_prog_free_deferred
r5:858cbc00 r4:8291a680
r4:00000000
r4:00000000
r5:84b6a38c r4:84b6a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b6a38c r4:85925500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858cbc00 r8:8592552c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85925500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85925500 r8:80287e08 r7:ebce5e60 r6:85925580 r5:858cbc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdf9fb0 to 0xebdf9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8591cb00
INFO: task kworker/0:421:5807 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ce5ba000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r5:850c9800 r4:8291a680
r4:00000000
r4:00000000
r5:00001000 r4:eb3d5000
r5:85802f8c r4:85802c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85802f8c r4:85887e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:85887e00
Exception stack(0xebe25fb0 to 0xebe25ff8)
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: ce77e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:914:5812 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:914 state:D stack:0 pid:5812 tgid:5812 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebe3dd84 r8:00000002 r7:60000113 r6:ebe3dd8c r5:850c8c00
r4:850c8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850c8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe3de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928900
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb851000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580478c r4:85804400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580478c r4:85887e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850c8c00 r8:85887eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887e80 r8:80287e08 r7:ebfd1e60 r6:85925680 r5:850c8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe3dfb0 to 0xebe3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85928240
INFO: task kworker/1:914:5812 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cf270000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:850ca400 r4:8291a680
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8580378c r4:85803400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580378c r4:85887f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850ca400 r8:85887f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887f00 r8:80287e08 r7:ebe3de60 r6:85925700 r5:850ca400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe41fb0 to 0xebe41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85928240
INFO: task kworker/1:915:5813 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cf270000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:916:5815 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:916 state:D stack:0 pid:5815 tgid:5815 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebe55d84 r8:00000002 r7:60000113 r6:ebe55d8c r5:850c8000
r4:850c8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850c8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe55e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5f1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85803b8c r4:85803800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85803b8c r4:85887f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850c8000 r8:85887fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85887f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85887f80 r8:80287e08 r7:ebe3de60 r6:85925780 r5:850c8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe55fb0 to 0xebe55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85928100
INFO: task kworker/1:916:5815 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cf6d9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:917:5817 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:917 state:D stack:0 pid:5817 tgid:5817 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r5:850cc800 r4:8291a680
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928580
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85803f8c r4:85803c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85803f8c r4:85930000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850cc800 r8:8593002c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930000 r8:80287e08 r7:ebe3de60 r6:85925800 r5:850cc800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe65fb0 to 0xebe65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85928300
INFO: task kworker/1:917:5817 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cf6d9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc7-syzkaller #0
Call trace:
r5:850cb000 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe01e08
r4:00000000
r5:00001000 r4:eb709000
r5:84b69f8c r4:84b69c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b69f8c r4:85925880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850cb000 r8:859258ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85925880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85925880 r8:80287e08 r7:ebce5e60 r6:85925900 r5:850cb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe01fb0 to 0xebe01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85937280
INFO: task kworker/0:422:5820 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cf76d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
INFO: task kworker/0:423:5822 blocked for more than 475 seconds.
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:858b438c r4:858b4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:850cd400 r8:859259ac r7:82804d40 r6:dddced80 r5:dddceda0
Workqueue: events bpf_prog_free_deferred
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
r5:852bd78c r4:852bd400
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:918:5823 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:918 state:D stack:0 pid:5823 tgid:5823 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebe71d84 r8:00000002 r7:60000113 r6:ebe71d8c r5:850ce000
r4:850ce000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850ce000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe71e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85937680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84b69b8c r4:84b69800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84b69b8c r4:85930080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850ce000 r8:859300ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930080 r8:80287e08 r7:ebe3de60 r6:85925a80 r5:850ce000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe71fb0 to 0xebe71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:859285c0
INFO: task kworker/1:918:5823 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r4:00000000
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r5:852bd78c r4:852bd400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:852cfa40
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:850cec00 r4:8291a680
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:8580438c r4:85804000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580438c r4:85930100
r10:61c88647 r9:850cec00 r8:8593012c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: cff58000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
INFO: task kworker/1:920:5828 blocked for more than 475 seconds.
r10:8291a684 r9:ebea1d84 r8:00000002 r7:60000013 r6:ebea1d8c r5:858f0c00
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
r5:85804b8c r4:85804800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85804b8c r4:85930180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f0c00 r8:859301ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:85930180 r8:80287e08 r7:ebe3de60 r6:85925b80 r5:858f0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebea1fb0 to 0xebea1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85928780
INFO: task kworker/1:920:5828 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d0118000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:921:5830 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:921 state:D stack:0 pid:5830 tgid:5830 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebfd9d84 r8:00000002 r7:60000113 r6:ebfd9d8c r5:858f2400
r4:858f2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r4:00000000
r4:00000000
r5:00001000 r4:eba5b000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85804f8c r4:85804c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85804f8c r4:85930200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f2400 r8:8593022c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930200 r8:80287e08 r7:ebea1e60 r6:85925c00 r5:858f2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfd9fb0 to 0xebfd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:859288c0
INFO: task kworker/1:921:5830 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d02f6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:922:5831 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:922 state:D stack:0 pid:5831 tgid:5831 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r5:858f0000 r4:8291a680
r9:83018205 r8:858f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
r5:8580578c r4:85805400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xebfddfb0 to 0xebfddff8)
r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Workqueue: events bpf_prog_free_deferred
r4:00000000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba7b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580538c r4:85805000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580538c r4:85930300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f1800 r8:8593032c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930300 r8:80287e08 r7:ebfdde60 r6:85925d00 r5:858f1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfedfb0 to 0xebfedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:859289c0
INFO: task kworker/1:923:5833 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d08c8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:924:5835 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:924 state:D stack:0 pid:5835 tgid:5835 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebff5d84 r8:00000002 r7:60000113 r6:ebff5d8c r5:858f3000
r4:858f3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858f3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebff5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928f80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:85805b8c r4:85805800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85805b8c r4:85930380
r10:61c88647 r9:858f3000 r8:859303ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebff5fb0 to 0xebff5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85928b80
INFO: task kworker/1:924:5835 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d0b63000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
INFO: task kworker/1:925:5837 blocked for more than 475 seconds.
r10:8291a684 r9:ebffdd84 r8:00000002 r7:60000113 r6:ebffdd8c r5:858f3c00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebffde08
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebc31000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580638c r4:85806000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580638c r4:85930400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f3c00 r8:8593042c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930400 r8:80287e08 r7:ebff5e60 r6:85925e00 r5:858f3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebffdfb0 to 0xebffdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85928c80
INFO: task kworker/1:925:5837 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d0f62000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:926:5839 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:926 state:D stack:0 pid:5839 tgid:5839 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:8291a684 r9:ec005d84 r8:00000002 r7:60000113 r6:ec005d8c r5:858f4800
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85916f80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbd3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85805f8c r4:85805c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85805f8c r4:85930480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f4800 r8:859304ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930480 r8:80287e08 r7:ebffde60 r6:85925e80 r5:858f4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec005fb0 to 0xec005ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85928e00
INFO: task kworker/1:926:5839 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d0f62000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:927:5841 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:927 state:D stack:0 pid:5841 tgid:5841 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec00dd84 r8:00000002 r7:60000113 r6:ec00dd8c r5:858f5400
r4:858f5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858f5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec00de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591c680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebc65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580678c r4:85806400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580678c r4:85930500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f5400 r8:8593052c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930500 r8:80287e08 r7:ebffde60 r6:85925f00 r5:858f5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec00dfb0 to 0xec00dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85928e00
INFO: task kworker/1:927:5841 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d14cf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:928:5843 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:928 state:D stack:0 pid:5843 tgid:5843 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec015d84 r8:00000002 r7:60000113 r6:ec015d8c r5:858f6000
r4:858f6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858f6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec015e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaded000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580738c r4:85807000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580738c r4:85930580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f6000 r8:859305ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930580 r8:80287e08 r7:ec00de60 r6:85925f80 r5:858f6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec015fb0 to 0xec015ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8591c440
INFO: task kworker/1:928:5843 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d14cf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:929:5845 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:929 state:D stack:0 pid:5845 tgid:5845 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec01dd84 r8:00000002 r7:60000113 r6:ec01dd8c r5:858f6c00
r4:858f6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858f6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec01de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587b240
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfaf3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85806b8c r4:85806800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85806b8c r4:85930600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f6c00 r8:8593062c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930600 r8:80287e08 r7:ec015e60 r6:849ed000 r5:858f6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec01dfb0 to 0xec01dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8591c140
INFO: task kworker/1:929:5845 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d179f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:424:5847 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:424 state:D stack:0 pid:5847 tgid:5847 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec019d84 r8:00000002 r7:60000113 r6:ec019d8c r5:850d0000
r4:850d0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850d0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec019e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849eb3c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:850d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebd93000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b478c r4:858b4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b478c r4:849ed080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850d0000 r8:849ed0ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:849ed080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:849ed080 r8:80287e08 r7:ebce5e60 r6:849ed100 r5:850d0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec019fb0 to 0xec019ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849eb280
INFO: task kworker/0:424:5847 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d1a06000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:930:5850 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:930 state:D stack:0 pid:5850 tgid:5850 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebf1dd84 r8:00000002 r7:60000113 r6:ebf1dd8c r5:8582ec00
r4:8582ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8582ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf1de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8582ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0947000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85806f8c r4:85806c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85806f8c r4:85930680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8582ec00 r8:859306ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930680 r8:80287e08 r7:ec015e60 r6:85930700 r5:8582ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf1dfb0 to 0xebf1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8587b040
INFO: task kworker/1:930:5850 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d1c64000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:425:5853 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:425 state:D stack:0 pid:5853 tgid:5853 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebf4dd84 r8:00000002 r7:60000113 r6:ebf4dd8c r5:850d2400
r4:850d2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850d2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf4de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ebe00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:850d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b4f8c r4:858b4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b4f8c r4:849ed180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850d2400 r8:849ed1ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:849ed180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:849ed180 r8:80287e08 r7:ebce5e60 r6:849ed200 r5:850d2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf4dfb0 to 0xebf4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849eb4c0
INFO: task kworker/0:425:5853 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d20f8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:931:5855 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:931 state:D stack:0 pid:5855 tgid:5855 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec021d84 r8:00000002 r7:60000013 r6:ec021d8c r5:850d1800
r4:850d1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850d1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec021e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722840
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb56f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580838c r4:85808000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580838c r4:85930780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850d1800 r8:859307ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930780 r8:80287e08 r7:ec015e60 r6:849ed280 r5:850d1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec021fb0 to 0xec021ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84722380
INFO: task kworker/1:931:5855 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d266e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:932:5857 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:932 state:D stack:0 pid:5857 tgid:5857 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec029d84 r8:00000002 r7:60000113 r6:ec029d8c r5:850d3c00
r4:850d3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850d3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec029e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb103000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580778c r4:85807400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580778c r4:85930800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850d3c00 r8:8593082c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930800 r8:80287e08 r7:ec021e60 r6:849ed300 r5:850d3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec029fb0 to 0xec029ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84722380
INFO: task kworker/1:932:5857 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d266e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:933:5858 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:933 state:D stack:0 pid:5858 tgid:5858 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec039d84 r8:00000002 r7:60000013 r6:ec039d8c r5:850d4800
r4:850d4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850d4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec039e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb357000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85807b8c r4:85807800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85807b8c r4:85930880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850d4800 r8:859308ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930880 r8:80287e08 r7:ec021e60 r6:849ed380 r5:850d4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec039fb0 to 0xec039ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84722180
INFO: task kworker/1:933:5858 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d27a4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:934:5860 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:934 state:D stack:0 pid:5860 tgid:5860 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec041d84 r8:00000002 r7:60000013 r6:ec041d8c r5:850d5400
r4:850d5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850d5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec041e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85807f8c r4:85807c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85807f8c r4:85930900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850d5400 r8:8593092c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930900 r8:80287e08 r7:ec021e60 r6:849ed400 r5:850d5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec041fb0 to 0xec041ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847223c0
INFO: task kworker/1:934:5860 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d2a89000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:935:5862 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:935 state:D stack:0 pid:5862 tgid:5862 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec045d84 r8:00000002 r7:60000113 r6:ec045d8c r5:850d0c00
r4:850d0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850d0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec045e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722c00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb8b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85808f8c r4:85808c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85808f8c r4:85930980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850d0c00 r8:859309ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930980 r8:80287e08 r7:ec021e60 r6:849ed480 r5:850d0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec045fb0 to 0xec045ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847226c0
INFO: task kworker/1:935:5862 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d2a89000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:426:5866 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:426 state:D stack:0 pid:5866 tgid:5866 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebe85d84 r8:00000002 r7:60000113 r6:ebe85d8c r5:850d6000
r4:850d6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850d6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe85e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84997540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:850d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebd0f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b538c r4:858b5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b538c r4:849ed500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850d6000 r8:849ed52c r7:82804d40 r6:dddced80 r5:dddceda0
r4:849ed500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:849ed500 r8:80287e08 r7:ebce5e60 r6:849ed580 r5:850d6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe85fb0 to 0xebe85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849ebc80
INFO: task kworker/0:426:5866 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d3239000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:936:5867 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:936 state:D stack:0 pid:5867 tgid:5867 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec049d84 r8:00000002 r7:60000113 r6:ec049d8c r5:850d6c00
r4:850d6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850d6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec049e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847229c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb78f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580878c r4:85808400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580878c r4:85930a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850d6c00 r8:85930a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930a00 r8:80287e08 r7:ec045e60 r6:849ed600 r5:850d6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec049fb0 to 0xec049ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847226c0
INFO: task kworker/1:936:5867 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d3239000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:937:5868 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:937 state:D stack:0 pid:5868 tgid:5868 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec04dd84 r8:00000002 r7:60000013 r6:ec04dd8c r5:850d3000
r4:850d3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850d3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec04de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722ac0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb887000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85808b8c r4:85808800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85808b8c r4:85930a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850d3000 r8:85930aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930a80 r8:80287e08 r7:ec045e60 r6:849ed680 r5:850d3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec04dfb0 to 0xec04dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847228c0
INFO: task kworker/1:937:5868 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d361b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:938:5871 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:938 state:D stack:0 pid:5871 tgid:5871 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec051d84 r8:00000002 r7:60000113 r6:ec051d8c r5:858f8000
r4:858f8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858f8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec051e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb8ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580938c r4:85809000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580938c r4:85930b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f8000 r8:85930b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930b00 r8:80287e08 r7:ec045e60 r6:849ed700 r5:858f8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec051fb0 to 0xec051ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84722a80
INFO: task kworker/1:938:5871 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d361b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:939:5872 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:939 state:D stack:0 pid:5872 tgid:5872 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebef5d84 r8:00000002 r7:60000113 r6:ebef5d8c r5:8582e000
r4:8582e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8582e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8582e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb933000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580978c r4:85809400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580978c r4:85930b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8582e000 r8:85930bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930b80 r8:80287e08 r7:ec051e60 r6:85930c00 r5:8582e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebef5fb0 to 0xebef5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84722c40
INFO: task kworker/1:939:5872 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d388e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:940:5873 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:940 state:D stack:0 pid:5873 tgid:5873 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec059d84 r8:00000002 r7:60000113 r6:ec059d8c r5:8582d400
r4:8582d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8582d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec059e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972100
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8582d400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb999000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85809f8c r4:85809c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85809f8c r4:85930c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8582d400 r8:85930cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930c80 r8:80287e08 r7:ebef5e60 r6:85930d00 r5:8582d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec059fb0 to 0xec059ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84722940
INFO: task kworker/1:940:5873 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d3cc4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:941:5876 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:941 state:D stack:0 pid:5876 tgid:5876 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec055d84 r8:00000002 r7:60000113 r6:ec055d8c r5:8582bc00
r4:8582bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8582bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec055e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591c140
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8582bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb967000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85809b8c r4:85809800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85809b8c r4:85930d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8582bc00 r8:85930dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930d80 r8:80287e08 r7:ec059e60 r6:85930e00 r5:8582bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec055fb0 to 0xec055ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84722fc0
INFO: task kworker/1:941:5876 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d3df4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:942:5879 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:942 state:D stack:0 pid:5879 tgid:5879 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec061d84 r8:00000002 r7:60000113 r6:ec061d8c r5:850cbc00
r4:850cbc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850cbc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec061e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580a38c r4:8580a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580a38c r4:85930e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850cbc00 r8:85930eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930e80 r8:80287e08 r7:ec059e60 r6:85930f00 r5:850cbc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec061fb0 to 0xec061ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84972140
INFO: task kworker/1:942:5879 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d3df4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:943:5881 blocked for more than 475 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:943 state:D stack:0 pid:5881 tgid:5881 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec065d84 r8:00000002 r7:60000113 r6:ec065d8c r5:85830000
r4:85830000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85830000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec065e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85830000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580a78c r4:8580a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580a78c r4:85930f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85830000 r8:85930fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85930f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85930f80 r8:80287e08 r7:ec061e60 r6:84978000 r5:85830000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec065fb0 to 0xec065ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84972080
INFO: task kworker/1:943:5881 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d403b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:944:5883 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:944 state:D stack:0 pid:5883 tgid:5883 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec069d84 r8:00000002 r7:60000113 r6:ec069d8c r5:85830c00
r4:85830c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85830c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec069e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972600
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85830c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580ab8c r4:8580a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580ab8c r4:84978080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85830c00 r8:849780ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978080 r8:80287e08 r7:ec065e60 r6:84978100 r5:85830c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec069fb0 to 0xec069ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84972300
INFO: task kworker/1:944:5883 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d403b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:945:5885 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:945 state:D stack:0 pid:5885 tgid:5885 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec06dd84 r8:00000002 r7:60000113 r6:ec06dd8c r5:85831800
r4:85831800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85831800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec06de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85831800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb97000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580af8c r4:8580ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580af8c r4:84978180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85831800 r8:849781ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978180 r8:80287e08 r7:ec069e60 r6:84978200 r5:85831800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec06dfb0 to 0xec06dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84972400
INFO: task kworker/1:945:5885 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d4434000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:946:5888 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:946 state:D stack:0 pid:5888 tgid:5888 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec071d84 r8:00000002 r7:60000113 r6:ec071d8c r5:85832400
r4:85832400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85832400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec071e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85832400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebdcd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85944b8c r4:85944800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85944b8c r4:84978280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85832400 r8:849782ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978280 r8:80287e08 r7:ec06de60 r6:84978300 r5:85832400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec071fb0 to 0xec071ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84972580
INFO: task kworker/1:946:5888 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d4812000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:947:5889 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:947 state:D stack:0 pid:5889 tgid:5889 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec075d84 r8:00000002 r7:60000013 r6:ec075d8c r5:85833000
r4:85833000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85833000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec075e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849728c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85833000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebba9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580b38c r4:8580b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580b38c r4:84978380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85833000 r8:849783ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978380 r8:80287e08 r7:ec071e60 r6:84978400 r5:85833000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec075fb0 to 0xec075ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84972940
INFO: task kworker/1:947:5889 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d4812000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:948:5891 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:948 state:D stack:0 pid:5891 tgid:5891 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec079d84 r8:00000002 r7:60000113 r6:ec079d8c r5:85833c00
r4:85833c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85833c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec079e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972a00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85833c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbbb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580b78c r4:8580b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580b78c r4:84978480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85833c00 r8:849784ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978480 r8:80287e08 r7:ec071e60 r6:84978500 r5:85833c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec079fb0 to 0xec079ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84972580
INFO: task kworker/1:948:5891 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d510a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:949:5893 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:949 state:D stack:0 pid:5893 tgid:5893 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec885d84 r8:00000002 r7:60000113 r6:ec885d8c r5:85834800
r4:85834800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85834800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec885e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972c00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85834800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebca7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580bb8c r4:8580b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580bb8c r4:84978580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85834800 r8:849785ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978580 r8:80287e08 r7:ec071e60 r6:84978600 r5:85834800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec885fb0 to 0xec885ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84972a80
INFO: task kworker/1:949:5893 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d510a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:950:5894 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:950 state:D stack:0 pid:5894 tgid:5894 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec889d84 r8:00000002 r7:60000113 r6:ec889d8c r5:85835400
r4:85835400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85835400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec889e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972d40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85835400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebcb9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8580bf8c r4:8580bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8580bf8c r4:84978680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85835400 r8:849786ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978680 r8:80287e08 r7:ec071e60 r6:84978700 r5:85835400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec889fb0 to 0xec889ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84972bc0
INFO: task kworker/1:950:5894 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d544d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:951:5896 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:951 state:D stack:0 pid:5896 tgid:5896 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec88dd84 r8:00000002 r7:60000113 r6:ec88dd8c r5:85836c00
r4:85836c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85836c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849eb440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85836c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebd25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594438c r4:85944000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594438c r4:84978780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85836c00 r8:849787ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978780 r8:80287e08 r7:ec071e60 r6:84978800 r5:85836c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec88dfb0 to 0xec88dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84972bc0
INFO: task kworker/1:951:5896 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d570d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:427:5898 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:427 state:D stack:0 pid:5898 tgid:5898 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec891d84 r8:00000002 r7:60000113 r6:ec891d8c r5:85838c00
r4:85838c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85838c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec891e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84997680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85838c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebdf1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b578c r4:858b5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b578c r4:849ed780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85838c00 r8:849ed7ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:849ed780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:849ed780 r8:80287e08 r7:ebce5e60 r6:84978880 r5:85838c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec891fb0 to 0xec891ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849973c0
INFO: task kworker/0:427:5898 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d5a16000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:952:5901 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:952 state:D stack:0 pid:5901 tgid:5901 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec899d84 r8:00000002 r7:60000013 r6:ec899d8c r5:85839800
r4:85839800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85839800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec899e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f0c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85839800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebd3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594478c r4:85944400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594478c r4:84978900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85839800 r8:8497892c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978900 r8:80287e08 r7:ec071e60 r6:84978980 r5:85839800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec899fb0 to 0xec899ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8593f100
INFO: task kworker/1:952:5901 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d5a16000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:953:5903 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:953 state:D stack:0 pid:5903 tgid:5903 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec89dd84 r8:00000002 r7:60000113 r6:ec89dd8c r5:8583b000
r4:8583b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8583b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec89de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8583b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebea5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85945f8c r4:85945c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85945f8c r4:84978a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8583b000 r8:84978a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978a00 r8:80287e08 r7:ec071e60 r6:84978a80 r5:8583b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec89dfb0 to 0xec89dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8593f280
INFO: task kworker/1:953:5903 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d5f6e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:428:5905 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:428 state:D stack:0 pid:5905 tgid:5905 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8a1d84 r8:00000002 r7:60000113 r6:ec8a1d8c r5:8583a400
r4:8583a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8583a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a3e00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8583a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebff9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b638c r4:858b6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b638c r4:849ed800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8583a400 r8:849ed82c r7:82804d40 r6:dddced80 r5:dddceda0
r4:849ed800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:849ed800 r8:80287e08 r7:ebce5e60 r6:84978b00 r5:8583a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8a1fb0 to 0xec8a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84997500
INFO: task kworker/0:428:5905 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d6310000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:954:5906 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:954 state:D stack:0 pid:5906 tgid:5906 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8a9d84 r8:00000002 r7:60000013 r6:ec8a9d8c r5:8583c800
r4:8583c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8583c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f6c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8583c800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe0d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85944f8c r4:85944c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85944f8c r4:84978b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8583c800 r8:84978bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978b80 r8:80287e08 r7:ec89de60 r6:84978c00 r5:8583c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8a9fb0 to 0xec8a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8593f540
INFO: task kworker/1:954:5906 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d687f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:955:5908 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:955 state:D stack:0 pid:5908 tgid:5908 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8add84 r8:00000002 r7:60000113 r6:ec8add8c r5:85838000
r4:85838000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85838000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f880
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85838000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe2d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b5b8c r4:858b5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:858b5b8c r4:84978c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85838000 r8:84978cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978c80 r8:80287e08 r7:ec89de60 r6:84978d00 r5:85838000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8adfb0 to 0xec8adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8593f540
INFO: task kworker/1:955:5908 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d69b0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:956:5911 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:956 state:D stack:0 pid:5911 tgid:5911 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8a5d84 r8:00000002 r7:60000013 r6:ec8a5d8c r5:8583d400
r4:8583d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8583d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593fac0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8583d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe4d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594538c r4:85945000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594538c r4:84978d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8583d400 r8:84978dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978d80 r8:80287e08 r7:ec89de60 r6:84978e00 r5:8583d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8a5fb0 to 0xec8a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8593f940
INFO: task kworker/1:956:5911 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d6fbb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:957:5913 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:957 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec895d84 r8:00000002 r7:60000113 r6:ec895d8c r5:8583e000
r4:8583e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8583e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8583e000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594578c r4:85945400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594578c r4:84978e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8583e000 r8:84978eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978e80 r8:80287e08 r7:ec89de60 r6:84978f00 r5:8583e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec895fb0 to 0xec895ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8593fb00
INFO: task kworker/1:957:5913 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d6fbb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:958:5915 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:958 state:D stack:0 pid:5915 tgid:5915 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8bdd84 r8:00000002 r7:60000013 r6:ec8bdd8c r5:858fb000
r4:858fb000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858fb000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593fd80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe8f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85945b8c r4:85945800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85945b8c r4:84978f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858fb000 r8:84978fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84978f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84978f80 r8:80287e08 r7:ec89de60 r6:849ed880 r5:858fb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8bdfb0 to 0xec8bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8593fb00
INFO: task kworker/1:958:5915 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d722e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:959:5916 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:959 state:D stack:0 pid:5916 tgid:5916 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8c1d84 r8:00000002 r7:60000113 r6:ec8c1d8c r5:858f8c00
r4:858f8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858f8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972cc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebec1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594638c r4:85946000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594638c r4:8497c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f8c00 r8:8497c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c000 r8:80287e08 r7:ec89de60 r6:849ed900 r5:858f8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8c1fb0 to 0xec8c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8593fe40
INFO: task kworker/1:959:5916 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d722e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:960:5919 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:960 state:D stack:0 pid:5919 tgid:5919 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8c9d84 r8:00000002 r7:60000013 r6:ec8c9d8c r5:858fd400
r4:858fd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858fd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d680
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebf53000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594778c r4:85947400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594778c r4:8497c080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858fd400 r8:8497c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c080 r8:80287e08 r7:ec8c1e60 r6:849ed980 r5:858fd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8c9fb0 to 0xec8c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8593ff40
INFO: task kworker/1:960:5919 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d7cae000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:961:5920 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:961 state:D stack:0 pid:5920 tgid:5920 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8cdd84 r8:00000002 r7:60000113 r6:ec8cdd8c r5:858fe000
r4:858fe000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858fe000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8cde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebeff000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594678c r4:85946400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594678c r4:8497c100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858fe000 r8:8497c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c100 r8:80287e08 r7:ec8c9e60 r6:849eda00 r5:858fe000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8cdfb0 to 0xec8cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8593ff80
INFO: task kworker/1:961:5920 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d8038000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:962:5922 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:962 state:D stack:0 pid:5922 tgid:5922 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8d5d84 r8:00000002 r7:60000113 r6:ec8d5d8c r5:858fc800
r4:858fc800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858fc800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebf13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85946b8c r4:85946800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85946b8c r4:8497c180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858fc800 r8:8497c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c180 r8:80287e08 r7:ec8c9e60 r6:849eda80 r5:858fc800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8d5fb0 to 0xec8d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497d1c0
INFO: task kworker/1:962:5922 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d82c0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:963:5924 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:963 state:D stack:0 pid:5924 tgid:5924 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8ddd84 r8:00000002 r7:60000013 r6:ec8ddd8c r5:858fec00
r4:858fec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858fec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d400
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebf2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85946f8c r4:85946c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85946f8c r4:8497c200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858fec00 r8:8497c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c200 r8:80287e08 r7:ec8c9e60 r6:849edb00 r5:858fec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8ddfb0 to 0xec8ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497d100
INFO: task kworker/1:963:5924 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d8349000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:964:5926 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:964 state:D stack:0 pid:5926 tgid:5926 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8b5d84 r8:00000002 r7:60000113 r6:ec8b5d8c r5:8583ec00
r4:8583ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8583ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8583ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebf3b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594738c r4:85947000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594738c r4:8497c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8583ec00 r8:8497c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c280 r8:80287e08 r7:ec8c9e60 r6:8497c300 r5:8583ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8b5fb0 to 0xec8b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497d200
INFO: task kworker/1:964:5926 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d87c5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:965:5929 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:965 state:D stack:0 pid:5929 tgid:5929 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8e5d84 r8:00000002 r7:60000013 r6:ec8e5d8c r5:85836000
r4:85836000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85836000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d880
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85836000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebf69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85947b8c r4:85947800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85947b8c r4:8497c380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85836000 r8:8497c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c380 r8:80287e08 r7:ec8c9e60 r6:8497c400 r5:85836000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8e5fb0 to 0xec8e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497d3c0
INFO: task kworker/1:965:5929 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d8c66000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:966:5930 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:966 state:D stack:0 pid:5930 tgid:5930 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec05dd84 r8:00000002 r7:60000013 r6:ec05dd8c r5:85980c00
r4:85980c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85980c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec05de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497da00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85980c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df83b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85947f8c r4:85947c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85947f8c r4:8497c480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85980c00 r8:8497c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c480 r8:80287e08 r7:ec8e5e60 r6:8497c500 r5:85980c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec05dfb0 to 0xec05dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497d580
INFO: task kworker/1:966:5930 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d8f64000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:967:5933 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:967 state:D stack:0 pid:5933 tgid:5933 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebfc5d84 r8:00000002 r7:60000113 r6:ebfc5d8c r5:858fa400
r4:858fa400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858fa400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfc5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497db80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa9b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594838c r4:85948000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594838c r4:8497c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858fa400 r8:8497c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c580 r8:80287e08 r7:ec05de60 r6:849edb80 r5:858fa400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfc5fb0 to 0xebfc5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497d580
INFO: task kworker/1:967:5933 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d90cb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:968:5934 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:968 state:D stack:0 pid:5934 tgid:5934 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8e9d84 r8:00000002 r7:60000113 r6:ec8e9d8c r5:858f9800
r4:858f9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858f9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497dc40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594878c r4:85948400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594878c r4:8497c600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858f9800 r8:8497c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c600 r8:80287e08 r7:ebfc5e60 r6:849edc00 r5:858f9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8e9fb0 to 0xec8e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497d780
INFO: task kworker/1:968:5934 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d9345000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:969:5937 blocked for more than 476 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:969 state:D stack:0 pid:5937 tgid:5937 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8f5d84 r8:00000002 r7:60000013 r6:ec8f5d8c r5:84b00c00
r4:84b00c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b00c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497ddc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb213000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85948b8c r4:85948800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85948b8c r4:8497c680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b00c00 r8:8497c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c680 r8:80287e08 r7:ec8e9e60 r6:849edc80 r5:84b00c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8f5fb0 to 0xec8f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497dac0
INFO: task kworker/1:969:5937 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d955b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:970:5939 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:970 state:D stack:0 pid:5939 tgid:5939 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8fdd84 r8:00000002 r7:60000113 r6:ec8fdd8c r5:84b02400
r4:84b02400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b02400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8fde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497dbc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b02400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85948f8c r4:85948c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85948f8c r4:8497c700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b02400 r8:8497c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c700 r8:80287e08 r7:ec8f5e60 r6:849edd00 r5:84b02400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8fdfb0 to 0xec8fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497dbc0
INFO: task kworker/1:970:5939 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d9678000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:971:5940 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:971 state:D stack:0 pid:5940 tgid:5940 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec901d84 r8:00000002 r7:60000113 r6:ec901d8c r5:84b03000
r4:84b03000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b03000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4040
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b03000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb68d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85949b8c r4:85949800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85949b8c r4:8497c780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b03000 r8:8497c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c780 r8:80287e08 r7:ec8fde60 r6:849edd80 r5:84b03000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec901fb0 to 0xec901ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497dbc0
INFO: task kworker/1:971:5940 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d9937000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:972:5942 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:972 state:D stack:0 pid:5942 tgid:5942 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec909d84 r8:00000002 r7:60000113 r6:ec909d8c r5:84b01800
r4:84b01800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b01800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84997c80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b01800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb453000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594938c r4:85949000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594938c r4:8497c800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b01800 r8:8497c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c800 r8:80287e08 r7:ec901e60 r6:849ede00 r5:84b01800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec909fb0 to 0xec909ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497dd80
INFO: task kworker/1:972:5942 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d9b64000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:973:5944 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:973 state:D stack:0 pid:5944 tgid:5944 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec911d84 r8:00000002 r7:60000113 r6:ec911d8c r5:84b00000
r4:84b00000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b00000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec911e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593fe40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b00000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594978c r4:85949400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594978c r4:8497c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b00000 r8:8497c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c880 r8:80287e08 r7:ec901e60 r6:849ede80 r5:84b00000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec911fb0 to 0xec911ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84997a00
INFO: task kworker/1:973:5944 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d9d57000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:974:5947 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:974 state:D stack:0 pid:5947 tgid:5947 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec90dd84 r8:00000002 r7:60000113 r6:ec90dd8c r5:85982400
r4:85982400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85982400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec90de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4380
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85982400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb6ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85949f8c r4:85949c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85949f8c r4:8497c900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85982400 r8:8497c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497c900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497c900 r8:80287e08 r7:ec901e60 r6:8497c980 r5:85982400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec90dfb0 to 0xec90dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a4100
INFO: task kworker/1:974:5947 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: d9f9a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:975:5949 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:975 state:D stack:0 pid:5949 tgid:5949 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8e1d84 r8:00000002 r7:60000113 r6:ec8e1d8c r5:85983c00
r4:85983c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85983c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85983c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594a38c r4:8594a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594a38c r4:8497ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85983c00 r8:8497ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497ca00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497ca00 r8:80287e08 r7:ec90de60 r6:8497ca80 r5:85983c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8e1fb0 to 0xec8e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a4200
INFO: task kworker/1:975:5949 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: da2c4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:976:5951 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:976 state:D stack:0 pid:5951 tgid:5951 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec919d84 r8:00000002 r7:60000013 r6:ec919d8c r5:85983000
r4:85983000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85983000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4740
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85983000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb837000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594a78c r4:8594a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594a78c r4:8497cb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85983000 r8:8497cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497cb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497cb00 r8:80287e08 r7:ec8e1e60 r6:8497cb80 r5:85983000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec919fb0 to 0xec919ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a40c0
INFO: task kworker/1:976:5951 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: da4be000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:977:5952 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:977 state:D stack:0 pid:5952 tgid:5952 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec91dd84 r8:00000002 r7:60000113 r6:ec91dd8c r5:84b03c00
r4:84b03c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b03c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4980
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba4d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594af8c r4:8594ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594af8c r4:8497cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b03c00 r8:8497cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497cc00 r8:80287e08 r7:ec919e60 r6:849edf00 r5:84b03c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec91dfb0 to 0xec91dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a40c0
INFO: task kworker/1:977:5952 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: da784000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:978:5955 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:978 state:D stack:0 pid:5955 tgid:5955 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec929d84 r8:00000002 r7:60000013 r6:ec929d8c r5:84b06c00
r4:84b06c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b06c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec929e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4800
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba05000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594ab8c r4:8594a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594ab8c r4:8497cc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b06c00 r8:8497ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497cc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497cc80 r8:80287e08 r7:ec91de60 r6:849edf80 r5:84b06c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec929fb0 to 0xec929ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a4680
INFO: task kworker/1:978:5955 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: daa64000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:979:5956 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:979 state:D stack:0 pid:5956 tgid:5956 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec925d84 r8:00000002 r7:60000013 r6:ec925d8c r5:85985400
r4:85985400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85985400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4b40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85985400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eba83000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594b38c r4:8594b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594b38c r4:8497cd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85985400 r8:8497cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497cd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497cd00 r8:80287e08 r7:ec91de60 r6:8497cd80 r5:85985400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec925fb0 to 0xec925ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a4780
INFO: task kworker/1:979:5956 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dad0a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:980:5958 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:980 state:D stack:0 pid:5958 tgid:5958 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec8edd84 r8:00000002 r7:60000113 r6:ec8edd8c r5:85986000
r4:85986000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85986000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4fc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85986000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebc53000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594bb8c r4:8594b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594bb8c r4:8497ce00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85986000 r8:8497ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497ce00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497ce00 r8:80287e08 r7:ec925e60 r6:8497ce80 r5:85986000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8edfb0 to 0xec8edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a49c0
INFO: task kworker/1:980:5958 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dafd8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:981:5961 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:981 state:D stack:0 pid:5961 tgid:5961 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec931d84 r8:00000002 r7:60000013 r6:ec931d8c r5:85980000
r4:85980000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85980000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4ec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85980000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbc1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594b78c r4:8594b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594b78c r4:8497cf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85980000 r8:8497cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8497cf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8497cf00 r8:80287e08 r7:ec8ede60 r6:8497cf80 r5:85980000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec931fb0 to 0xec931ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a4bc0
INFO: task kworker/1:981:5961 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: db3e8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:982:5964 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:982 state:D stack:0 pid:5964 tgid:5964 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec92dd84 r8:00000002 r7:60000113 r6:ec92dd8c r5:85981800
r4:85981800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85981800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec92de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497dec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85981800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebc6d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8594bf8c r4:8594bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8594bf8c r4:84aa1000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85981800 r8:84aa102c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1000 r8:80287e08 r7:ec8ede60 r6:84aa1080 r5:85981800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec92dfb0 to 0xec92dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a4dc0
INFO: task kworker/1:982:5964 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: db6ac000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:983:5966 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:983 state:D stack:0 pid:5966 tgid:5966 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec935d84 r8:00000002 r7:60000113 r6:ec935d8c r5:85984800
r4:85984800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85984800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec935e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84997a00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85984800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebd85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595038c r4:85950000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595038c r4:84aa1100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85984800 r8:84aa112c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1100 r8:80287e08 r7:ec92de60 r6:84aa1180 r5:85984800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec935fb0 to 0xec935ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8497dfc0
INFO: task kworker/1:983:5966 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: db6ac000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:984:5968 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:984 state:D stack:0 pid:5968 tgid:5968 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec939d84 r8:00000002 r7:60000113 r6:ec939d8c r5:85986c00
r4:85986c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85986c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec939e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223140
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85986c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebde3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595078c r4:85950400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595078c r4:84aa1200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85986c00 r8:84aa122c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1200 r8:80287e08 r7:ec935e60 r6:84aa1280 r5:85986c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec939fb0 to 0xec939ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849971c0
INFO: task kworker/1:984:5968 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dbacd000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:985:5970 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:985 state:D stack:0 pid:5970 tgid:5970 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec93dd84 r8:00000002 r7:60000113 r6:ec93dd8c r5:8583bc00
r4:8583bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8583bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec93de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223300
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8583bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe2f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85950b8c r4:85950800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85950b8c r4:84aa1300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8583bc00 r8:84aa132c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1300 r8:80287e08 r7:ec939e60 r6:84aa1380 r5:8583bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec93dfb0 to 0xec93dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84223080
INFO: task kworker/1:985:5970 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dbc20000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:986:5972 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:986 state:D stack:0 pid:5972 tgid:5972 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec941d84 r8:00000002 r7:60000113 r6:ec941d8c r5:85840000
r4:85840000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85840000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec941e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223500
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85840000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe8b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85950f8c r4:85950c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85950f8c r4:84aa1400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85840000 r8:84aa142c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1400 r8:80287e08 r7:ec93de60 r6:84aa1480 r5:85840000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec941fb0 to 0xec941ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84223180
INFO: task kworker/1:986:5972 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dbd13000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:987:5973 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:987 state:D stack:0 pid:5973 tgid:5973 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec921d84 r8:00000002 r7:60000113 r6:ec921d8c r5:85840c00
r4:85840c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85840c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223600
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85840c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebef7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595138c r4:85951000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595138c r4:84aa1500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85840c00 r8:84aa152c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1500 r8:80287e08 r7:ec941e60 r6:84aa1580 r5:85840c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec921fb0 to 0xec921ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84223180
INFO: task kworker/1:987:5973 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dbef0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:988:5976 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:988 state:D stack:0 pid:5976 tgid:5976 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec945d84 r8:00000002 r7:60000113 r6:ec945d8c r5:85841800
r4:85841800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85841800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec945e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842237c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85841800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebfa9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595178c r4:85951400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595178c r4:84aa1600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85841800 r8:84aa162c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1600 r8:80287e08 r7:ec921e60 r6:84aa1680 r5:85841800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec945fb0 to 0xec945ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84223400
INFO: task kworker/1:988:5976 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dc1c4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:989:5979 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:989 state:D stack:0 pid:5979 tgid:5979 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec94dd84 r8:00000002 r7:60000113 r6:ec94dd8c r5:85842400
r4:85842400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85842400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec94de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842238c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85842400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebfc9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85951b8c r4:85951800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85951b8c r4:84aa1700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85842400 r8:84aa172c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1700 r8:80287e08 r7:ec945e60 r6:84aa1780 r5:85842400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec94dfb0 to 0xec94dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84223640
INFO: task kworker/1:989:5979 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dc461000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:990:5980 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:990 state:D stack:0 pid:5980 tgid:5980 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec951d84 r8:00000002 r7:60000113 r6:ec951d8c r5:85843000
r4:85843000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85843000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223a80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85843000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebfe1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85951f8c r4:85951c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85951f8c r4:84aa1800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85843000 r8:84aa182c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1800 r8:80287e08 r7:ec94de60 r6:84aa1880 r5:85843000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec951fb0 to 0xec951ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84223640
INFO: task kworker/1:990:5980 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dc705000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:991:5981 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:991 state:D stack:0 pid:5981 tgid:5981 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec949d84 r8:00000002 r7:60000013 r6:ec949d8c r5:85844800
r4:85844800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85844800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec949e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223f40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85844800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec881000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595278c r4:85952400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595278c r4:84aa1900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85844800 r8:84aa192c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1900 r8:80287e08 r7:ec951e60 r6:84aa1980 r5:85844800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec949fb0 to 0xec949ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84223640
INFO: task kworker/1:991:5981 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dcfe0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:429:5984 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:429 state:D stack:0 pid:5984 tgid:5984 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec955d84 r8:00000002 r7:60000113 r6:ec955d8c r5:84b05400
r4:84b05400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b05400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec955e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a3800
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84b05400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec02d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b678c r4:858b6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b678c r4:8479b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b05400 r8:8479b02c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8479b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479b000 r8:80287e08 r7:ebce5e60 r6:8479b080 r5:84b05400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec955fb0 to 0xec955ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a3e80
INFO: task kworker/0:429:5984 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dcfe0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:992:5985 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:992 state:D stack:0 pid:5985 tgid:5985 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec95dd84 r8:00000002 r7:60000013 r6:ec95dd8c r5:84b06000
r4:84b06000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b06000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec95de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223dc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b06000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec009000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595238c r4:85952000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595238c r4:84aa1a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b06000 r8:84aa1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1a00 r8:80287e08 r7:ec949e60 r6:8479b100 r5:84b06000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec95dfb0 to 0xec95dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84223900
INFO: task kworker/1:992:5985 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dd3fe000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:430:5988 blocked for more than 477 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:430 state:D stack:0 pid:5988 tgid:5988 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec959d84 r8:00000002 r7:60000113 r6:ec959d8c r5:84b04800
r4:84b04800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b04800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2200
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84b04800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec98d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b6b8c r4:858b6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b6b8c r4:8479b180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b04800 r8:8479b1ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8479b180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479b180 r8:80287e08 r7:ebce5e60 r6:8479b200 r5:84b04800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec959fb0 to 0xec959ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:849a3c80
INFO: task kworker/0:430:5988 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dd86b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:993:5990 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:993 state:D stack:0 pid:5990 tgid:5990 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec96dd84 r8:00000002 r7:60000013 r6:ec96dd8c r5:858fbc00
r4:858fbc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:858fbc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec96de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223a00
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:858fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec969000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85952b8c r4:85952800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85952b8c r4:84aa1a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:858fbc00 r8:84aa1aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1a80 r8:80287e08 r7:ec949e60 r6:8479b280 r5:858fbc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec96dfb0 to 0xec96dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84223d00
INFO: task kworker/1:993:5990 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: de206000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:994:5992 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:994 state:D stack:0 pid:5992 tgid:5992 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec985d84 r8:00000002 r7:60000013 r6:ec985d8c r5:850e0000
r4:850e0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec985e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc180
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec975000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85952f8c r4:85952c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85952f8c r4:84aa1b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e0000 r8:84aa1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1b00 r8:80287e08 r7:ec96de60 r6:8479b300 r5:850e0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec985fb0 to 0xec985ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84223f00
INFO: task kworker/1:994:5992 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: de3c6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:995:5994 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:995 state:D stack:0 pid:5994 tgid:5994 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec995d84 r8:00000002 r7:60000113 r6:ec995d8c r5:850e0c00
r4:850e0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec995e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc540
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0541000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595378c r4:85953400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595378c r4:84aa1b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e0c00 r8:84aa1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1b80 r8:80287e08 r7:ec985e60 r6:8479b380 r5:850e0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec995fb0 to 0xec995ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847bc000
INFO: task kworker/1:995:5994 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: de76e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:996:5995 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:996 state:D stack:0 pid:5995 tgid:5995 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec999d84 r8:00000002 r7:60000013 r6:ec999d8c r5:850e1800
r4:850e1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec999e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df91f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595338c r4:85953000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595338c r4:84aa1c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e1800 r8:84aa1c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1c00 r8:80287e08 r7:ec995e60 r6:8479b400 r5:850e1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec999fb0 to 0xec999ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847bc000
INFO: task kworker/1:996:5995 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: deab4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:431:5997 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:431 state:D stack:0 pid:5997 tgid:5997 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec961d84 r8:00000002 r7:60000113 r6:ec961d8c r5:850e2400
r4:850e2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec961e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2c40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:850e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7b9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b738c r4:858b7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b738c r4:8479b480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e2400 r8:8479b4ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8479b480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479b480 r8:80287e08 r7:ebce5e60 r6:8479b500 r5:850e2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec961fb0 to 0xec961ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:846e2080
INFO: task kworker/0:431:5997 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: deefb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:997:6000 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:997 state:D stack:0 pid:6000 tgid:6000 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9b5d84 r8:00000002 r7:60000113 r6:ec9b5d8c r5:850e4800
r4:850e4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc640
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacc9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85953b8c r4:85953800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85953b8c r4:84aa1c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e4800 r8:84aa1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1c80 r8:80287e08 r7:ec995e60 r6:8479b580 r5:850e4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9b5fb0 to 0xec9b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847bc340
INFO: task kworker/1:997:6000 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: df41f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:998:6002 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:998 state:D stack:0 pid:6002 tgid:6002 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9d9d84 r8:00000002 r7:60000113 r6:ec9d9d8c r5:850e5400
r4:850e5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc940
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb367000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595c38c r4:8595c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595c38c r4:84aa1d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e5400 r8:84aa1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1d00 r8:80287e08 r7:ec9b5e60 r6:8479b600 r5:850e5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9d9fb0 to 0xec9d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847bc5c0
INFO: task kworker/1:998:6002 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: df857000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:999:6003 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:999 state:D stack:0 pid:6003 tgid:6003 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9ddd84 r8:00000002 r7:60000113 r6:ec9ddd8c r5:850e3c00
r4:850e3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc7c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0cb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85953f8c r4:85953c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85953f8c r4:84aa1d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e3c00 r8:84aa1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1d80 r8:80287e08 r7:ec9d9e60 r6:8479b680 r5:850e3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9ddfb0 to 0xec9ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847bc5c0
INFO: task kworker/1:999:6003 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dfd6f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1000:6005 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1000 state:D stack:0 pid:6005 tgid:6005 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9e5d84 r8:00000002 r7:600f0113 r6:ec9e5d8c r5:850e3000
r4:850e3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bcfc0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb987000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595cf8c r4:8595cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595cf8c r4:84aa1e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e3000 r8:84aa1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1e00 r8:80287e08 r7:ec9d9e60 r6:8479b700 r5:850e3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9e5fb0 to 0xec9e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847bc4c0
INFO: task kworker/1:1000:6005 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: dff38000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1001:6007 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1001 state:D stack:0 pid:6007 tgid:6007 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9edd84 r8:00000002 r7:60000013 r6:ec9edd8c r5:850e6000
r4:850e6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc780
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb517000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595c78c r4:8595c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595c78c r4:84aa1e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e6000 r8:84aa1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1e80 r8:80287e08 r7:ec9e5e60 r6:8479b780 r5:850e6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9edfb0 to 0xec9edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847bc780
INFO: task kworker/1:1001:6007 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e0265000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1002:6010 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1002 state:D stack:0 pid:6010 tgid:6010 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9a9d84 r8:00000002 r7:60000013 r6:ec9a9d8c r5:85846c00
r4:85846c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85846c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bcec0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85846c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb947000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595cb8c r4:8595c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595cb8c r4:84aa1f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85846c00 r8:84aa1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84aa1f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa1f00 r8:80287e08 r7:ec9e5e60 r6:84aa1f80 r5:85846c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9a9fb0 to 0xec9a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847bca40
INFO: task kworker/1:1002:6010 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e0387000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:432:6012 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:432 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9a5d84 r8:00000002 r7:60000113 r6:ec9a5d8c r5:850e6c00
r4:850e6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e8280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:850e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebcaf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84b6af8c r4:84b6ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b6af8c r4:8479b800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e6c00 r8:8479b82c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8479b800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479b800 r8:80287e08 r7:ebce5e60 r6:8479b880 r5:850e6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9a5fb0 to 0xec9a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:846e2ac0
INFO: task kworker/0:432:6012 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e0690000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:433:6013 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:433 state:D stack:0 pid:6013 tgid:6013 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9e9d84 r8:00000002 r7:60000113 r6:ec9e9d8c r5:84b18000
r4:84b18000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b18000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2f80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84b18000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb8eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b7b8c r4:858b7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b7b8c r4:8479b900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b18000 r8:8479b92c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8479b900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479b900 r8:80287e08 r7:ec9a5e60 r6:8479b980 r5:84b18000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9e9fb0 to 0xec9e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:846e2ac0
INFO: task kworker/0:433:6013 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e0b39000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:434:6016 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:434 state:D stack:0 pid:6016 tgid:6016 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9f5d84 r8:00000002 r7:60000113 r6:ec9f5d8c r5:84b18c00
r4:84b18c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b18c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f5e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2440
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84b18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:858b7f8c r4:858b7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:858b7f8c r4:8479ba00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b18c00 r8:8479ba2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8479ba00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479ba00 r8:80287e08 r7:ec9a5e60 r6:8479ba80 r5:84b18c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9f5fb0 to 0xec9f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:846e2e00
INFO: task kworker/0:434:6016 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e0d83000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1003:6019 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1003 state:D stack:0 pid:6019 tgid:6019 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9fdd84 r8:00000002 r7:60000013 r6:ec9fdd8c r5:84b19800
r4:84b19800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b19800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9fde08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bca80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b19800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595d38c r4:8595d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595d38c r4:846ee000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b19800 r8:846ee02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:846ee000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846ee000 r8:80287e08 r7:ec9e5e60 r6:8479bb00 r5:84b19800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9fdfb0 to 0xec9fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847bc9c0
INFO: task kworker/1:1003:6019 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e0f7f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1004:6021 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1004 state:D stack:0 pid:6021 tgid:6021 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eca01d84 r8:00000002 r7:60000113 r6:eca01d8c r5:85846000
r4:85846000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85846000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca01e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b837c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85846000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebd27000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595df8c r4:8595dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595df8c r4:846ee080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85846000 r8:846ee0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:846ee080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846ee080 r8:80287e08 r7:ec9fde60 r6:846ee100 r5:85846000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca01fb0 to 0xeca01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847bcf80
INFO: task kworker/1:1004:6021 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e10a3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:435:6023 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:435 state:D stack:0 pid:6023 tgid:6023 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eca09d84 r8:00000002 r7:60000113 r6:eca09d8c r5:85845400
r4:85845400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85845400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2280
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85845400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebba3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595db8c r4:8595d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8595db8c r4:8479bb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85845400 r8:8479bbac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8479bb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479bb80 r8:80287e08 r7:ec9a5e60 r6:846ee180 r5:85845400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca09fb0 to 0xeca09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:846e2840
INFO: task kworker/0:435:6023 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e1618000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1005:6024 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1005 state:D stack:0 pid:6024 tgid:6024 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ec9f9d84 r8:00000002 r7:60000013 r6:ec9f9d8c r5:84b1a400
r4:84b1a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b1a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f9e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b83100
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b1a400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb7d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595d78c r4:8595d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595d78c r4:846ee200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b1a400 r8:846ee22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:846ee200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846ee200 r8:80287e08 r7:eca01e60 r6:8479bc00 r5:84b1a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9f9fb0 to 0xec9f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:83b83180
INFO: task kworker/1:1005:6024 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e1912000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1006:6026 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1006 state:D stack:0 pid:6026 tgid:6026 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eca05d84 r8:00000002 r7:60000113 r6:eca05d8c r5:84b1b000
r4:84b1b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b1b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b83b40
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84b1b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebe17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8595eb8c r4:8595e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8595eb8c r4:846ee280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b1b000 r8:846ee2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:846ee280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:846ee280 r8:80287e08 r7:eca01e60 r6:8479bc80 r5:84b1b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca05fb0 to 0xeca05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:83b83280
INFO: task kworker/1:1006:6026 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e1912000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:436:6028 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:436 state:D stack:0 pid:6028 tgid:6028 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eca11d84 r8:00000002 r7:60000113 r6:eca11d8c r5:84b1bc00
r4:84b1bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b1bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca11e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e80c0
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84b1bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbcf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84b6b38c r4:84b6b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b6b38c r4:8479bd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b1bc00 r8:8479bd2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8479bd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479bd00 r8:80287e08 r7:ec9a5e60 r6:8479bd80 r5:84b1bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca11fb0 to 0xeca11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:846e2180
INFO: task kworker/0:436:6028 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e1c42000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:437:6030 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:437 state:D stack:0 pid:6030 tgid:6030 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eca0dd84 r8:00000002 r7:60000113 r6:eca0dd8c r5:84b1c800
r4:84b1c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b1c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca0de08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84537d80
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84b1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec8f1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8597d38c r4:8597d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8597d38c r4:8479be00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b1c800 r8:8479be2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8479be00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479be00 r8:80287e08 r7:ec9a5e60 r6:8479be80 r5:84b1c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca0dfb0 to 0xeca0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845e8100
INFO: task kworker/0:437:6030 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e219f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:438:6032 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:438 state:D stack:0 pid:6032 tgid:6032 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eca15d84 r8:00000002 r7:60000113 r6:eca15d8c r5:84b1d400
r4:84b1d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b1d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca15e08
r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e8480
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84b1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebd09000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84b6ab8c r4:84b6a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84b6ab8c r4:8479bf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84b1d400 r8:8479bf2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8479bf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479bf00 r8:80287e08 r7:eca0de60 r6:8479bf80 r5:84b1d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca15fb0 to 0xeca15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845e8100
INFO: task kworker/0:438:6032 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426 state:R running task stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20: e24e3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:439:6034 blocked for more than 478 seconds.
Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:439 state:D stack:0 pid:6034 tgid:6034 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eca19d84 r8:00000002 r7:60000113 r6:eca19d8c r5:84b1e000
r4:84b1e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84b1e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)