INFO: task kworker/0:0:9 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:8323e000
r4:8323e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8323e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9e440
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84af678c r4:84af6400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84af678c r4:830b8400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8323e000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60
r4:830b8400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830b8400 r8:8027ed34 r7:df819e48 r6:830b8480 r5:8323e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf83dfb0 to 0xdf83dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:830b6180
INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b50bc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
INFO: task kworker/1:3:98 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:3 state:D stack:0 pid:98 tgid:98 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9b5d84 r8:00000002 r7:60000113 r6:df9b5d8c r5:83891800
r4:83891800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83891800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856981c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:83891800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec505000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85825f8c r4:85825c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85825f8c r4:83929080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83891800 r8:839290ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:83929080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:83929080 r8:8027ed34 r7:df9a9e60 r6:83929100 r5:83891800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9b5fb0 to 0xdf9b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:83926300
INFO: task kworker/1:3:98 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b5465000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
INFO: task kworker/0:1:3100 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:1 state:D stack:0 pid:3100 tgid:3100 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9b1d84 r8:00000002 r7:60000113 r6:df9b1d8c r5:838b2400
r4:838b2400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:838b2400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a82b80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:838b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e044d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84af638c r4:84af6000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84af638c r4:8473bf80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:838b2400 r8:8473bfac r7:82804d40 r6:dddced40 r5:dddced60
r4:8473bf80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8473bf80 r8:8027ed34 r7:df83de60 r6:8473be00 r5:838b2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9b1fb0 to 0xdf9b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84237940
INFO: task kworker/0:1:3100 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b5894000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
INFO: task kworker/1:4:3113 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:4 state:D stack:0 pid:3113 tgid:3113 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9d5d84 r8:00000002 r7:60000013 r6:df9d5d8c r5:83b55400
r4:83b55400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b55400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ffc00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:83b55400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb6b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850aff8c r4:850afc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850aff8c r4:84734e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b55400 r8:84734e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84734e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84734e00 r8:8027ed34 r7:df9c5e60 r6:8473b880 r5:83b55400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d5fb0 to 0xdf9d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84736380
INFO: task kworker/1:4:3113 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b5894000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
INFO: task kworker/0:3:3115 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:3 state:D stack:0 pid:3115 tgid:3115 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:8444bc00
r4:8444bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8444bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71a40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8444bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df951000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84af778c r4:84af7400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84af778c r4:8473bf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8444bc00 r8:8473bf2c r7:82804d40 r6:dddced40 r5:dddced60
r4:8473bf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8473bf00 r8:8027ed34 r7:df83de60 r6:8473b900 r5:8444bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d9fb0 to 0xdf9d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8472a340
INFO: task kworker/0:3:3115 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b5ce4000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
INFO: task kworker/1:5:3116 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:5 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:83b53000
r4:83b53000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b53000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ff4c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:83b53000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8ef000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850bbf8c r4:850bbc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850bbf8c r4:84734d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b53000 r8:84734dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84734d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84734d80 r8:8027ed34 r7:df9d5e60 r6:830b8600 r5:83b53000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9ddfb0 to 0xdf9ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84736380
INFO: task kworker/1:5:3116 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b5fbe000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
INFO: task kworker/0:4:3119 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:4 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:84182400
r4:84182400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84182400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a98a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84182400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df99d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851afb8c r4:851af800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851afb8c r4:830b8500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84182400 r8:830b852c r7:82804d40 r6:dddced40 r5:dddced60
r4:830b8500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830b8500 r8:8027ed34 r7:df9d9e60 r6:840bb580 r5:84182400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d1fb0 to 0xdf9d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8472a900
INFO: task kworker/0:4:3119 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b62c1000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
INFO: task kworker/0:5:3121 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:5 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:84185400
r4:84185400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84185400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003840
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84185400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df99b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be0b8c r4:84be0800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be0b8c r4:83c6f480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84185400 r8:83c6f4ac r7:82804d40 r6:dddced40 r5:dddced60
r4:83c6f480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:83c6f480 r8:8027ed34 r7:df9d1e60 r6:84318e80 r5:84185400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9b9fb0 to 0xdf9b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8472ad00
INFO: task kworker/0:5:3121 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b6604000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
INFO: task kworker/0:6:3123 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:6 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ec431d84 r8:00000002 r7:60000113 r6:ec431d8c r5:84036000
r4:84036000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84036000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec431e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841b92c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84036000 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df98f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be238c r4:84be2000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be238c r4:844e0b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84036000 r8:844e0b2c r7:82804d40 r6:dddced40 r5:dddced60
r4:844e0b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:844e0b00 r8:8027ed34 r7:df9d1e60 r6:845eb700 r5:84036000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec431fb0 to 0xec431ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8472abc0
INFO: task kworker/0:6:3123 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b6c3e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
INFO: task kworker/1:6:3125 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:6 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:84180c00
r4:84180c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84180c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84180c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec5fd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582678c r4:85826400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582678c r4:84734900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84180c00 r8:8473492c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84734900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84734900 r8:8027ed34 r7:df9d5e60 r6:845eb500 r5:84180c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa01fb0 to 0xdfa01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84736ac0
INFO: task kworker/1:6:3125 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b6c60000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:7:3126 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:7 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:8323ec00
r4:8323ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8323ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510b080
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8323ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9e1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851ad78c r4:851ad400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851ad78c r4:8426cb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8323ec00 r8:8426cb2c r7:82804d40 r6:dddced40 r5:dddced60
r4:8426cb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8426cb00 r8:8027ed34 r7:df9d1e60 r6:8426c900 r5:8323ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa05fb0 to 0xdfa05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8472a640
INFO: task kworker/0:7:3126 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b6f50000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:7:3128 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:7 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:83b65400
r4:83b65400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b65400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b904c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:83b65400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac5d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:856b138c r4:856b1000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:856b138c r4:84734980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b65400 r8:847349ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84734980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84734980 r8:8027ed34 r7:dfa01e60 r6:84734a00 r5:83b65400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9e5fb0 to 0xdf9e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84736ac0
INFO: task kworker/1:7:3128 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b74a2000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:8:3131 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:8 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:8324a400
r4:8324a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8324a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84786080
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8324a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0001000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8516778c r4:85167400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8516778c r4:8426ca80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8324a400 r8:8426caac r7:82804d40 r6:dddced40 r5:dddced60
r4:8426ca80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8426ca80 r8:8027ed34 r7:df9d1e60 r6:84734a80 r5:8324a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa19fb0 to 0xdfa19ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8472a300
INFO: task kworker/0:8:3131 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b7925000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:9:3133 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:9 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:833a8000
r4:833a8000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:833a8000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510d500
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:833a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9eb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d078c r4:851d0400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d078c r4:84785100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:833a8000 r8:8478512c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785100 r8:8027ed34 r7:dfa19e60 r6:84734b80 r5:833a8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa2dfb0 to 0xdfa2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8472ae80
INFO: task kworker/0:9:3133 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b7925000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:10:3134 blocked for more than 450 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:10 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:8324c800
r4:8324c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8324c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a55800
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8324c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0507000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85555f8c r4:85555c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85555f8c r4:84785000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8324c800 r8:8478502c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785000 r8:8027ed34 r7:dfa19e60 r6:84734c00 r5:8324c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa35fb0 to 0xdfa35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8472ae80
INFO: task kworker/0:10:3134 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b82ed000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:11:3136 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:11 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:83bb0000
r4:83bb0000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83bb0000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85346b80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83bb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0675000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b0f8c r4:852b0c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b0f8c r4:84785080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83bb0000 r8:847850ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785080 r8:8027ed34 r7:dfa35e60 r6:84734c80 r5:83bb0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa49fb0 to 0xdfa49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84786180
INFO: task kworker/0:11:3136 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b86d9000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:12:3138 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:12 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83bb3000
r4:83bb3000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83bb3000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85346e80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83bb3000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e882b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b338c r4:852b3000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b338c r4:84785180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83bb3000 r8:847851ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785180 r8:8027ed34 r7:dfa35e60 r6:84734d00 r5:83bb3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa55fb0 to 0xdfa55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84786100
INFO: task kworker/0:12:3138 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b8ecf000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:13:3140 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:13 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83bb0c00
r4:83bb0c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83bb0c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85024900
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83bb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaca3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b3f8c r4:852b3c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b3f8c r4:84785280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83bb0c00 r8:847852ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785280 r8:8027ed34 r7:dfa35e60 r6:84734b00 r5:83bb0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa65fb0 to 0xdfa65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84786400
INFO: task kworker/0:13:3140 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b91a4000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:14:3142 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:14 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:83bb6000
r4:83bb6000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83bb6000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85448980
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83bb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd81000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:853c478c r4:853c4400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:853c478c r4:84785300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83bb6000 r8:8478532c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785300 r8:8027ed34 r7:dfa35e60 r6:84734800 r5:83bb6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa6dfb0 to 0xdfa6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84786380
INFO: task kworker/0:14:3142 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b9477000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:15:3144 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:15 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:838ba400
r4:838ba400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:838ba400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516b8c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:838ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa47000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8547778c r4:85477400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8547778c r4:84785200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:838ba400 r8:8478522c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785200 r8:8027ed34 r7:dfa35e60 r6:84734380 r5:838ba400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa79fb0 to 0xdfa79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84786500
INFO: task kworker/0:15:3144 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b97ae000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:16:3146 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:16 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:838be000
r4:838be000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:838be000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010ec0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:838be000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e077d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:853c678c r4:853c6400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:853c678c r4:84785400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:838be000 r8:8478542c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785400 r8:8027ed34 r7:dfa35e60 r6:84734400 r5:838be000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa89fb0 to 0xdfa89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84786680
INFO: task kworker/0:16:3146 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b9a97000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:17:3148 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:17 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:8444e000
r4:8444e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8444e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545aa40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8444e000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac19000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:853c7b8c r4:853c7800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:853c7b8c r4:84785480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8444e000 r8:847854ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785480 r8:8027ed34 r7:dfa35e60 r6:84734480 r5:8444e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa9dfb0 to 0xdfa9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:847867c0
INFO: task kworker/0:17:3148 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b9dae000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:18:3150 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:18 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:838bd400
r4:838bd400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:838bd400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542ea80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:838bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8807000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:854deb8c r4:854de800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:854deb8c r4:84785380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:838bd400 r8:847853ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785380 r8:8027ed34 r7:dfa35e60 r6:84734500 r5:838bd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaa5fb0 to 0xdfaa5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:847868c0
INFO: task kworker/0:18:3150 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: b9dae000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:19:3152 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:19 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfab1d84 r8:00000002 r7:60000013 r6:dfab1d8c r5:838b8000
r4:838b8000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:838b8000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:838b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03d1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8555778c r4:85557400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8555778c r4:84785500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:838b8000 r8:8478552c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785500 r8:8027ed34 r7:dfa35e60 r6:84734580 r5:838b8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfab1fb0 to 0xdfab1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84786a00
INFO: task kworker/0:19:3152 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: ba789000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:20:3155 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:20 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:84461800
r4:84461800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84461800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84736c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84461800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb08b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:856d478c r4:856d4400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:856d478c r4:84785600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84461800 r8:8478562c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785600 r8:8027ed34 r7:dfab1e60 r6:84734600 r5:84461800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfac9fb0 to 0xdfac9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84786b40
INFO: task kworker/0:20:3155 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: ba8d2000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:21:3156 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:21 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:84460000
r4:84460000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84460000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a80600
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84460000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0607000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8557138c r4:85571000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8557138c r4:84785580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84460000 r8:847855ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785580 r8:8027ed34 r7:dfac9e60 r6:84734680 r5:84460000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfad5fb0 to 0xdfad5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84786d80
INFO: task kworker/0:21:3156 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: badc0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:8:3160 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:8 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:84462400
r4:84462400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84462400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763640
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84462400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb37f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8561db8c r4:8561d800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8561db8c r4:84734700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84462400 r8:8473472c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84734700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84734700 r8:8027ed34 r7:dfa01e60 r6:84734300 r5:84462400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9fdfb0 to 0xdf9fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8422bf40
INFO: task kworker/1:8:3160 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bb4b0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:9:3162 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:9 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:84463c00
r4:84463c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84463c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698340
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84463c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec533000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582638c r4:85826000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582638c r4:84734000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84463c00 r8:8473402c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84734000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84734000 r8:8027ed34 r7:dfa01e60 r6:84734280 r5:84463c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfae9fb0 to 0xdfae9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8422b980
INFO: task kworker/1:9:3162 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bb651000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:22:3163 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:22 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:84464800
r4:84464800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84464800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562ff00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84464800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec465000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:856d538c r4:856d5000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:856d538c r4:84785700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84464800 r8:8478572c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785700 r8:8027ed34 r7:dfac9e60 r6:84734200 r5:84464800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaf5fb0 to 0xdfaf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84786f40
INFO: task kworker/0:22:3163 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bbc8c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:23:3165 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:23 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84466000
r4:84466000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84466000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7e40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84466000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eccd5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:856d7f8c r4:856d7c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:856d7f8c r4:84785780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84466000 r8:847857ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785780 r8:8027ed34 r7:dfaf5e60 r6:84734080 r5:84466000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb01fb0 to 0xdfb01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8479d080
INFO: task kworker/0:23:3165 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bc18e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:24:3167 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:24 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:84465400
r4:84465400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84465400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e7640
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84465400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffc5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:856d5b8c r4:856d5800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:856d5b8c r4:84785680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84465400 r8:847856ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785680 r8:8027ed34 r7:dfb01e60 r6:84734100 r5:84465400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb11fb0 to 0xdfb11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8479d1c0
INFO: task kworker/0:24:3167 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bc7bf000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:25:3168 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:25 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:84466c00
r4:84466c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84466c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479d080
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84466c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec2bd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:856d738c r4:856d7000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:856d738c r4:84785880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84466c00 r8:847858ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785880 r8:8027ed34 r7:dfb01e60 r6:84734180 r5:84466c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb15fb0 to 0xdfb15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8479d1c0
INFO: task kworker/0:25:3168 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bc9cf000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:26:3170 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:26 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:84463000
r4:84463000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84463000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7980
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84463000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ecae5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:856d7b8c r4:856d7800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:856d7b8c r4:84785800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84463000 r8:8478582c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785800 r8:8027ed34 r7:dfb01e60 r6:84734f00 r5:84463000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb1dfb0 to 0xdfb1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8479d140
INFO: task kworker/0:26:3170 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bd1b3000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:27:3172 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:27 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb29d84 r8:00000002 r7:60000013 r6:dfb29d8c r5:84a28000
r4:84a28000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a28000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85804cc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a28000 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec897000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8596c38c r4:8596c000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8596c38c r4:84785900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a28000 r8:8478592c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785900 r8:8027ed34 r7:dfb1de60 r6:84734f80 r5:84a28000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb29fb0 to 0xdfb29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8479d380
INFO: task kworker/0:27:3172 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bd4ce000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:28:3174 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:28 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:84a29800
r4:84a29800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a29800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7440
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a29800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7f5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:847d778c r4:847d7400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:847d778c r4:84785a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a29800 r8:84785a2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785a00 r8:8027ed34 r7:dfb29e60 r6:83349880 r5:84a29800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb39fb0 to 0xdfb39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8479d440
INFO: task kworker/0:28:3174 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bd641000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:29:3176 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:29 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:84a28c00
r4:84a28c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a28c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85669100
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7bb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:847d7b8c r4:847d7800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:847d7b8c r4:84785a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a28c00 r8:84785aac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785a80 r8:8027ed34 r7:dfb29e60 r6:83349800 r5:84a28c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb4dfb0 to 0xdfb4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8479d580
INFO: task kworker/0:29:3176 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bd9b5000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:30:3178 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:30 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:84a2a400
r4:84a2a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a2a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ed3c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb603000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:847d678c r4:847d6400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:847d678c r4:84785980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a2a400 r8:847859ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785980 r8:8027ed34 r7:dfb29e60 r6:8421e600 r5:84a2a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb55fb0 to 0xdfb55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8479d6c0
INFO: task kworker/0:30:3178 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bde1c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:31:3180 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:31 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:84a2c800
r4:84a2c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a2c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ed640
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a2c800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb43000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:847d7f8c r4:847d7c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:847d7f8c r4:84785b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a2c800 r8:84785bac r7:82804d40 r6:dddced40 r5:dddced60
r4:84785b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785b80 r8:8027ed34 r7:dfb29e60 r6:8421e580 r5:84a2c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb69fb0 to 0xdfb69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8479d840
INFO: task kworker/0:31:3180 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bde1c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:32:3182 blocked for more than 451 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:32 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:84a2bc00
r4:84a2bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a2bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ed2c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84a2bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1d5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ecad3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85963b8c r4:85963800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85963b8c r4:84785c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a2bc00 r8:84785c2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84785c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84785c00 r8:8027ed34 r7:dfb29e60 r6:83ffaa00 r5:84a2bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb75fb0 to 0xdfb75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8479d940
INFO: task kworker/0:32:3182 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: be928000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:10:3188 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:10 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84a2b000
r4:84a2b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a2b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856987c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec759000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582738c r4:85827000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582738c r4:8390ab80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a2b000 r8:8390abac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8390ab80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8390ab80 r8:8027ed34 r7:dfa01e60 r6:8390a380 r5:84a2b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9f5fb0 to 0xdf9f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8478dc00
INFO: task kworker/1:10:3188 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: be928000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:11:3189 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:11 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfac5d84 r8:00000002 r7:60000013 r6:dfac5d8c r5:84a2e000
r4:84a2e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a2e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698500
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec625000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85826b8c r4:85826800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85826b8c r4:8390a400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a2e000 r8:8390a42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8390a400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8390a400 r8:8027ed34 r7:df9f5e60 r6:8390ab00 r5:84a2e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfac5fb0 to 0xdfac5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8478dc00
INFO: task kworker/1:11:3189 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bed32000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:12:3192 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:12 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:84a2ec00
r4:84a2ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a2ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698700
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec655000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85826f8c r4:85826c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85826f8c r4:830cd100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a2ec00 r8:830cd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:830cd100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:830cd100 r8:8027ed34 r7:df9f5e60 r6:830cd400 r5:84a2ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb8dfb0 to 0xdfb8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8478df80
INFO: task kworker/1:12:3192 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: beeb4000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:13:3196 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:13 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfba1d84 r8:00000002 r7:60000113 r6:dfba1d8c r5:84a30000
r4:84a30000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a30000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698900
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a30000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec779000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582778c r4:85827400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582778c r4:83ffa980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a30000 r8:83ffa9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:83ffa980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:83ffa980 r8:8027ed34 r7:df9f5e60 r6:8391b800 r5:84a30000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfba1fb0 to 0xdfba1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8478d440
INFO: task kworker/1:13:3196 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bf200000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:14:3198 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:14 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbadd84 r8:00000002 r7:60000013 r6:dfbadd8c r5:84a30c00
r4:84a30c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a30c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec7b3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85827f8c r4:85827c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85827f8c r4:8391b780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a30c00 r8:8391b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8391b780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8391b780 r8:8027ed34 r7:dfba1e60 r6:83359080 r5:84a30c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbadfb0 to 0xdfbadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8478d380
INFO: task kworker/1:14:3198 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bf31c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:15:3199 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:15 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84a31800
r4:84a31800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a31800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856989c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a31800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec797000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85827b8c r4:85827800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85827b8c r4:83359000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a31800 r8:8335902c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:83359000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:83359000 r8:8027ed34 r7:dfbade60 r6:84a51000 r5:84a31800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbbdfb0 to 0xdfbbdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8478d780
INFO: task kworker/1:15:3199 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bf7cc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:16:3202 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:16 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:84a32400
r4:84a32400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a32400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a32400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec7c9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582c38c r4:8582c000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582c38c r4:84a51080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a32400 r8:84a510ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a51080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a51080 r8:8027ed34 r7:dfbade60 r6:84a51180 r5:84a32400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbb9fb0 to 0xdfbb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a53200
INFO: task kworker/1:16:3202 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: bf90f000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:17:3204 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:17 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:84a33000
r4:84a33000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a33000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698d00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a33000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec7e5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582c78c r4:8582c400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582c78c r4:84a51100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a33000 r8:84a5112c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a51100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a51100 r8:8027ed34 r7:dfbb9e60 r6:84a51200 r5:84a33000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbd1fb0 to 0xdfbd1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a53340
INFO: task kworker/1:17:3204 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c00b2000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:18:3206 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:18 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:84a33c00
r4:84a33c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a33c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec96b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582cb8c r4:8582c800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582cb8c r4:84a51280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a33c00 r8:84a512ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a51280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a51280 r8:8027ed34 r7:dfbd1e60 r6:84a51380 r5:84a33c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbd9fb0 to 0xdfbd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a53500
INFO: task kworker/1:18:3206 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c02d1000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:19:3208 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:19 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbe5d84 r8:00000002 r7:60000013 r6:dfbe5d8c r5:84a34800
r4:84a34800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a34800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698f00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a34800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec975000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582cf8c r4:8582cc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582cf8c r4:84a51300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a34800 r8:84a5132c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a51300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a51300 r8:8027ed34 r7:dfbd9e60 r6:84a51400 r5:84a34800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbe5fb0 to 0xdfbe5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a53680
INFO: task kworker/1:19:3208 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c044e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:20:3210 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:20 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:84a35400
r4:84a35400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a35400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fd380
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a35400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec9a1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582db8c r4:8582d800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582db8c r4:84a51480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a35400 r8:84a514ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a51480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a51480 r8:8027ed34 r7:dfbe5e60 r6:84a51500 r5:84a35400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbedfb0 to 0xdfbedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a537c0
INFO: task kworker/1:20:3210 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c0c0b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:21:3212 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:21 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:84a36000
r4:84a36000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a36000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f0e40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a36000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec98f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582d78c r4:8582d400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582d78c r4:84a51580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a36000 r8:84a515ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a51580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a51580 r8:8027ed34 r7:dfbede60 r6:84a51680 r5:84a36000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbf9fb0 to 0xdfbf9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a53a00
INFO: task kworker/1:21:3212 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c0d93000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:22:3214 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:22 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:84a36c00
r4:84a36c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a36c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a36c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec9ad000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:856d778c r4:856d7400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:856d778c r4:84a51600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a36c00 r8:84a5162c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a51600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a51600 r8:8027ed34 r7:dfbede60 r6:84a51780 r5:84a36c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc01fb0 to 0xdfc01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a53b00
INFO: task kworker/1:22:3214 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c0f06000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:23:3216 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:23 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:84a38000
r4:84a38000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a38000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e8100
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a38000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec9c9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582df8c r4:8582dc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582df8c r4:84a51700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a38000 r8:84a5172c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a51700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a51700 r8:8027ed34 r7:dfc01e60 r6:84a51880 r5:84a38000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc0dfb0 to 0xdfc0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a53c40
INFO: task kworker/1:23:3216 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c11b7000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:24:3217 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:24 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:84a38c00
r4:84a38c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a38c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e8280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ec9f3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582e38c r4:8582e000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582e38c r4:84a51800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a38c00 r8:84a5182c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a51800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a51800 r8:8027ed34 r7:dfc0de60 r6:84a51900 r5:84a38c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbc5fb0 to 0xdfbc5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a53c40
INFO: task kworker/1:24:3217 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c1486000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:25:3220 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:25 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84a39800
r4:84a39800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a39800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e8340
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a39800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eca0d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8582e78c r4:8582e400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8582e78c r4:84a51980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a39800 r8:84a519ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a51980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a51980 r8:8027ed34 r7:dfbc5e60 r6:84a51a00 r5:84a39800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc15fb0 to 0xdfc15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a53f80
INFO: task kworker/1:25:3220 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c156b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:114:3478 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:114 state:D stack:0 pid:3478 tgid:3478 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff21d84 r8:00000002 r7:60000113 r6:dff21d8c r5:848d0c00
r4:848d0c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848d0c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff21e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472a800
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:848d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff4b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84af6b8c r4:84af6800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84af6b8c r4:84b6e280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d0c00 r8:84b6e2ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b6e280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6e280 r8:8027ed34 r7:dff19e60 r6:84b6e300 r5:848d0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff21fb0 to 0xdff21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b72580
INFO: task kworker/0:114:3478 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c198e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:115:3480 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:115 state:D stack:0 pid:3480 tgid:3480 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff2dd84 r8:00000002 r7:60000113 r6:dff2dd8c r5:848d2400
r4:848d2400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848d2400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff2de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:848d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acc38c r4:84acc000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84acc38c r4:84b6e200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d2400 r8:84b6e22c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b6e200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6e200 r8:8027ed34 r7:dff21e60 r6:84b6e380 r5:848d2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff2dfb0 to 0xdff2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b70000
INFO: task kworker/0:115:3480 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c1ec0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:78:3491 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:78 state:D stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff59d84 r8:00000002 r7:60000013 r6:dff59d8c r5:848d6c00
r4:848d6c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848d6c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff59e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
INFO: task kworker/1:78:3491 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c1ec0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:79:3493 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:79 state:D stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff61d84 r8:00000002 r7:60000113 r6:dff61d8c r5:849e0c00
r4:849e0c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849e0c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff61e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
INFO: task kworker/1:79:3493 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c2104000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:80:3495 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:80 state:D stack:0 pid:3495 tgid:3495 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff69d84 r8:00000002 r7:60000013 r6:dff69d8c r5:849e0000
r4:849e0000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849e0000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff69e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe15000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acdb8c r4:84acd800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acdb8c r4:84b6f680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0000 r8:84b6f6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f680 r8:8027ed34 r7:dff59e60 r6:84b6e780 r5:849e0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff69fb0 to 0xdff69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73c00
INFO: task kworker/1:80:3495 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c234c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:81:3497 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:81 state:D stack:0 pid:3497 tgid:3497 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff71d84 r8:00000002 r7:60000113 r6:dff71d8c r5:849e1800
r4:849e1800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849e1800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff71e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73d80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfced000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acbb8c r4:84acb800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acbb8c r4:84b6f880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e1800 r8:84b6f8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f880 r8:8027ed34 r7:dff69e60 r6:84b6e800 r5:849e1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff71fb0 to 0xdff71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73b40
INFO: task kworker/1:81:3497 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c25bc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:82:3499 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:82 state:D stack:0 pid:3499 tgid:3499 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff79d84 r8:00000002 r7:60000113 r6:dff79d8c r5:849e2400
r4:849e2400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849e2400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff79e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73ec0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd1b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acbf8c r4:84acbc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acbf8c r4:84b6fa00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e2400 r8:84b6fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6fa00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6fa00 r8:8027ed34 r7:dff69e60 r6:84b6e880 r5:849e2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff79fb0 to 0xdff79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73cc0
INFO: task kworker/1:82:3499 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c282b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:83:3501 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:83 state:D stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff81d84 r8:00000002 r7:60000113 r6:dff81d8c r5:849e3000
r4:849e3000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849e3000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff81e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84725f00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfda3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:845a038c r4:845a0000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:845a038c r4:84b6fa80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e3000 r8:84b6faac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6fa80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6fa80 r8:8027ed34 r7:dff69e60 r6:84b6e900 r5:849e3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff81fb0 to 0xdff81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73e00
INFO: task kworker/1:83:3501 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c2958000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:84:3503 blocked for more than 452 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:84 state:D stack:0 pid:3503 tgid:3503 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff89d84 r8:00000002 r7:60000113 r6:dff89d8c r5:849e5400
r4:849e5400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849e5400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff89e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52140
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdc5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acc78c r4:84acc400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acc78c r4:84b6f980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e5400 r8:84b6f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f980 r8:8027ed34 r7:dff69e60 r6:84b6e980 r5:849e5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff89fb0 to 0xdff89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73f40
INFO: task kworker/1:84:3503 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c2bce000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:116:3505 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:116 state:D stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff85d84 r8:00000002 r7:60000113 r6:dff85d8c r5:849e3c00
r4:849e3c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849e3c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff85e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497ee00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfff5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84af5f8c r4:84af5c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84af5f8c r4:84b6ea00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e3c00 r8:84b6ea2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b6ea00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6ea00 r8:8027ed34 r7:dff21e60 r6:84b6eb00 r5:849e3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff85fb0 to 0xdff85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b70680
INFO: task kworker/0:116:3505 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c2e7f000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:85:3508 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:85 state:D stack:0 pid:3508 tgid:3508 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff95d84 r8:00000002 r7:60000113 r6:dff95d8c r5:849e4800
r4:849e4800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849e4800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff95e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52240
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdd5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84accb8c r4:84acc800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84accb8c r4:84b6fb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e4800 r8:84b6fb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6fb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6fb00 r8:8027ed34 r7:dff69e60 r6:84b6ea80 r5:849e4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff95fb0 to 0xdff95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b52180
INFO: task kworker/1:85:3508 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c2edc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:86:3509 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:86 state:D stack:0 pid:3509 tgid:3509 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff99d84 r8:00000002 r7:60000013 r6:dff99d8c r5:849e6000
r4:849e6000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849e6000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff99e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52380
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfde7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84accf8c r4:84accc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84accf8c r4:84b6fb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e6000 r8:84b6fbac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6fb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6fb80 r8:8027ed34 r7:dff69e60 r6:84b6eb80 r5:849e6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff99fb0 to 0xdff99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b52180
INFO: task kworker/1:86:3509 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c337c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:87:3511 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:87 state:D stack:0 pid:3511 tgid:3511 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffa1d84 r8:00000002 r7:60000113 r6:dffa1d8c r5:84b30000
r4:84b30000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b30000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffa1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52500
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b30000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdf9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acd38c r4:84acd000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acd38c r4:84b6fc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b30000 r8:84b6fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6fc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6fc00 r8:8027ed34 r7:dff69e60 r6:84b6ec00 r5:84b30000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffa1fb0 to 0xdffa1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b522c0
INFO: task kworker/1:87:3511 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c35c5000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:88:3513 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:88 state:D stack:0 pid:3513 tgid:3513 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffa9d84 r8:00000002 r7:60000113 r6:dffa9d8c r5:84b31800
r4:84b31800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b31800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffa9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b525c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b31800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe03000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acd78c r4:84acd400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acd78c r4:84b6fc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b31800 r8:84b6fcac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6fc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6fc80 r8:8027ed34 r7:dff69e60 r6:84b6ec80 r5:84b31800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffa9fb0 to 0xdffa9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b52440
INFO: task kworker/1:88:3513 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c38e8000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:89:3515 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:89 state:D stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffb1d84 r8:00000002 r7:60000113 r6:dffb1d8c r5:84b30c00
r4:84b30c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b30c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52b40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe4f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ace78c r4:84ace400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ace78c r4:84b6f900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b30c00 r8:84b6f92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f900 r8:8027ed34 r7:dff69e60 r6:84b6ed00 r5:84b30c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffb1fb0 to 0xdffb1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b52580
INFO: task kworker/1:89:3515 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c3a7b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:90:3517 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:90 state:D stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffb9d84 r8:00000002 r7:60000113 r6:dffb9d8c r5:84b32400
r4:84b32400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b32400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52880
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b32400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe2b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acdf8c r4:84acdc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acdf8c r4:84b6fd00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b32400 r8:84b6fd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6fd00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6fd00 r8:8027ed34 r7:dffb1e60 r6:84b6ed80 r5:84b32400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffb9fb0 to 0xdffb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b528c0
INFO: task kworker/1:90:3517 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c3c17000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:91:3519 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:91 state:D stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffc1d84 r8:00000002 r7:60000113 r6:dffc1d8c r5:84b33000
r4:84b33000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b33000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b33000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe35000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ace38c r4:84ace000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ace38c r4:84b6fd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b33000 r8:84b6fdac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6fd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6fd80 r8:8027ed34 r7:dffb1e60 r6:84b6ee00 r5:84b33000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffc1fb0 to 0xdffc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b527c0
INFO: task kworker/1:91:3519 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c4127000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:92:3521 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:92 state:D stack:0 pid:3521 tgid:3521 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffc9d84 r8:00000002 r7:60000013 r6:dffc9d8c r5:84b33c00
r4:84b33c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b33c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784080
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfea5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acff8c r4:84acfc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acff8c r4:84b6ff00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b33c00 r8:84b6ff2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6ff00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6ff00 r8:8027ed34 r7:dffb1e60 r6:84b6ee80 r5:84b33c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffc9fb0 to 0xdffc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b52940
INFO: task kworker/1:92:3521 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c4420000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:93:3523 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:93 state:D stack:0 pid:3523 tgid:3523 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffd1d84 r8:00000002 r7:60000113 r6:dffd1d8c r5:84b34800
r4:84b34800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b34800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b34800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe5b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84aceb8c r4:84ace800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84aceb8c r4:84b6fe80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b34800 r8:84b6feac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6fe80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6fe80 r8:8027ed34 r7:dffc9e60 r6:84b6ef00 r5:84b34800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd1fb0 to 0xdffd1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b52a80
INFO: task kworker/1:93:3523 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c4420000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:94:3525 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:94 state:D stack:0 pid:3525 tgid:3525 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffd9d84 r8:00000002 r7:60000113 r6:dffd9d8c r5:84b35400
r4:84b35400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b35400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b35400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe6b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acef8c r4:84acec00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acef8c r4:84b6ff80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b35400 r8:84b6ffac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6ff80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6ff80 r8:8027ed34 r7:dffc9e60 r6:84b6ef80 r5:84b35400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd9fb0 to 0xdffd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b52a80
INFO: task kworker/1:94:3525 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c45ba000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:95:3527 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:95 state:D stack:0 pid:3527 tgid:3527 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffe1d84 r8:00000002 r7:60000113 r6:dffe1d8c r5:848d6000
r4:848d6000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848d6000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52f00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe77000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acf38c r4:84acf000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acf38c r4:84b6fe00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6000 r8:84b6fe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6fe00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6fe00 r8:8027ed34 r7:dffc9e60 r6:84727000 r5:848d6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b52d00
INFO: task kworker/1:95:3527 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c48b7000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:96:3529 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:96 state:D stack:0 pid:3529 tgid:3529 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffe9d84 r8:00000002 r7:60000013 r6:dffe9d8c r5:84b36c00
r4:84b36c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b36c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70fc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b36c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe85000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acf78c r4:84acf400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acf78c r4:8479c100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b36c00 r8:8479c12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c100 r8:8027ed34 r7:dffc9e60 r6:84727080 r5:84b36c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe9fb0 to 0xdffe9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b52e40
INFO: task kworker/1:96:3529 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c4c4e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:97:3531 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:97 state:D stack:0 pid:3531 tgid:3531 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff25d84 r8:00000002 r7:60000113 r6:dff25d8c r5:84b28c00
r4:84b28c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b28c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff25e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6bf80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe97000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acfb8c r4:84acf800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acfb8c r4:8479c000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b28c00 r8:8479c02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c000 r8:8027ed34 r7:dffc9e60 r6:8479c080 r5:84b28c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff25fb0 to 0xdff25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b70e00
INFO: task kworker/1:97:3531 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c4cca000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:98:3533 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:98 state:D stack:0 pid:3533 tgid:3533 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff29d84 r8:00000002 r7:60000013 r6:dff29d8c r5:84b26000
r4:84b26000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b26000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff29e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784500
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b26000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffff000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad078c r4:84ad0400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad078c r4:8479c180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b26000 r8:8479c1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c180 r8:8027ed34 r7:dffc9e60 r6:8479c280 r5:84b26000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff29fb0 to 0xdff29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784100
INFO: task kworker/1:98:3533 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c5014000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:99:3535 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:99 state:D stack:0 pid:3535 tgid:3535 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dffedd84 r8:00000002 r7:60000113 r6:dffedd8c r5:84b38c00
r4:84b38c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b38c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffede08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847842c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad038c r4:84ad0000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad038c r4:8479c200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b38c00 r8:8479c22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c200 r8:8027ed34 r7:dff29e60 r6:8479c380 r5:84b38c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffedfb0 to 0xdffedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784200
INFO: task kworker/1:99:3535 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c5181000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:117:3538 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:117 state:D stack:0 pid:3538 tgid:3538 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfff1d84 r8:00000002 r7:60000113 r6:dfff1d8c r5:84b36000
r4:84b36000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b36000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b711c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84b36000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff6d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84af738c r4:84af7000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84af738c r4:84727100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b36000 r8:8472712c r7:82804d40 r6:dddced40 r5:dddced60
r4:84727100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84727100 r8:8027ed34 r7:dff21e60 r6:84727200 r5:84b36000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfff1fb0 to 0xdfff1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8497ed40
INFO: task kworker/0:117:3538 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c53d6000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:100:3540 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:100 state:D stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0009d84 r8:00000002 r7:60000113 r6:e0009d8c r5:849e6c00
r4:849e6c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849e6c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0009e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847846c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df8e5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad0b8c r4:84ad0800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad0b8c r4:8479c300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e6c00 r8:8479c32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c300 r8:8027ed34 r7:dff29e60 r6:84727180 r5:849e6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0009fb0 to 0xe0009ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784440
INFO: task kworker/1:100:3540 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c5607000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:101:3542 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:101 state:D stack:0 pid:3542 tgid:3542 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e000dd84 r8:00000002 r7:60000013 r6:e000dd8c r5:84910000
r4:84910000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84910000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e000de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847848c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84910000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9bd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad138c r4:84ad1000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad138c r4:8479c480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84910000 r8:8479c4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c480 r8:8027ed34 r7:e0009e60 r6:84727280 r5:84910000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe000dfb0 to 0xe000dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784600
INFO: task kworker/1:101:3542 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c584a000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:102:3544 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:102 state:D stack:0 pid:3544 tgid:3544 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0015d84 r8:00000002 r7:60000013 r6:e0015d8c r5:84911800
r4:84911800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84911800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0015e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84911800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df967000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad0f8c r4:84ad0c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad0f8c r4:8479c500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84911800 r8:8479c52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c500 r8:8027ed34 r7:e000de60 r6:84727300 r5:84911800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0015fb0 to 0xe0015ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784740
INFO: task kworker/1:102:3544 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c5a84000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:103:3546 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:103 state:D stack:0 pid:3546 tgid:3546 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e001dd84 r8:00000002 r7:60000013 r6:e001dd8c r5:84910c00
r4:84910c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84910c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e001de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784980
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84910c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9e7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad178c r4:84ad1400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad178c r4:8479c580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84910c00 r8:8479c5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c580 r8:8027ed34 r7:e000de60 r6:84727380 r5:84910c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe001dfb0 to 0xe001dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:847849c0
INFO: task kworker/1:103:3546 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c5cba000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:104:3548 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:104 state:D stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0025d84 r8:00000002 r7:60000113 r6:e0025d8c r5:84912400
r4:84912400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84912400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0025e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784f40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84912400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa83000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad278c r4:84ad2400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad278c r4:8479c600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84912400 r8:8479c62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c600 r8:8027ed34 r7:e001de60 r6:84727400 r5:84912400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0025fb0 to 0xe0025ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784880
INFO: task kworker/1:104:3548 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c5fd8000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:105:3550 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:105 state:D stack:0 pid:3550 tgid:3550 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e002dd84 r8:00000002 r7:60000013 r6:e002dd8c r5:84914800
r4:84914800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84914800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e002de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84914800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa21000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad1b8c r4:84ad1800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad1b8c r4:8479c400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84914800 r8:8479c42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c400 r8:8027ed34 r7:e0025e60 r6:84727480 r5:84914800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe002dfb0 to 0xe002dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784880
INFO: task kworker/1:105:3550 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c6200000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:106:3552 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:106 state:D stack:0 pid:3552 tgid:3552 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0035d84 r8:00000002 r7:60000113 r6:e0035d8c r5:84916000
r4:84916000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84916000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0035e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84916000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa41000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad1f8c r4:84ad1c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad1f8c r4:8479c680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84916000 r8:8479c6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c680 r8:8027ed34 r7:e0025e60 r6:84727500 r5:84916000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0035fb0 to 0xe0035ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784a40
INFO: task kworker/1:106:3552 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c65be000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:107:3554 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:107 state:D stack:0 pid:3554 tgid:3554 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0041d84 r8:00000002 r7:60000113 r6:e0041d8c r5:84916c00
r4:84916c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84916c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0041e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84916c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa5d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad238c r4:84ad2000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad238c r4:8479c780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84916c00 r8:8479c7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c780 r8:8027ed34 r7:e0025e60 r6:84727580 r5:84916c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0041fb0 to 0xe0041ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784bc0
INFO: task kworker/1:107:3554 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c69cc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:108:3556 blocked for more than 453 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:108 state:D stack:0 pid:3556 tgid:3556 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0045d84 r8:00000002 r7:60000013 r6:e0045d8c r5:84915400
r4:84915400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84915400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0045e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84915400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfabb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad2f8c r4:84ad2c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad2f8c r4:8479c800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84915400 r8:8479c82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c800 r8:8027ed34 r7:e0025e60 r6:84727600 r5:84915400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0045fb0 to 0xe0045ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784e80
INFO: task kworker/1:108:3556 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c6be1000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:109:3558 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:109 state:D stack:0 pid:3558 tgid:3558 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0049d84 r8:00000002 r7:60000113 r6:e0049d8c r5:84913c00
r4:84913c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84913c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0049e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497e840
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84913c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfaa7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad2b8c r4:84ad2800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad2b8c r4:8479c880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84913c00 r8:8479c8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c880 r8:8027ed34 r7:e0045e60 r6:84727680 r5:84913c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0049fb0 to 0xe0049ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8497e880
INFO: task kworker/1:109:3558 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c6fed000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:110:3560 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:110 state:D stack:0 pid:3560 tgid:3560 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e004dd84 r8:00000002 r7:60000113 r6:e004dd8c r5:84913000
r4:84913000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84913000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e004de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84736740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84913000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfae3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad338c r4:84ad3000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad338c r4:8479c900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84913000 r8:8479c92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c900 r8:8027ed34 r7:e0045e60 r6:84727700 r5:84913000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe004dfb0 to 0xe004dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784280
INFO: task kworker/1:110:3560 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c728f000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:111:3562 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:111 state:D stack:0 pid:3562 tgid:3562 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0051d84 r8:00000002 r7:60000113 r6:e0051d8c r5:848f8000
r4:848f8000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848f8000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0051e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe73000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad5b8c r4:84ad5800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad5b8c r4:8479c980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848f8000 r8:8479c9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c980 r8:8027ed34 r7:e004de60 r6:84727780 r5:848f8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0051fb0 to 0xe0051ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84784280
INFO: task kworker/1:111:3562 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c7581000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:112:3564 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:112 state:D stack:0 pid:3564 tgid:3564 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0055d84 r8:00000002 r7:60000113 r6:e0055d8c r5:848f8c00
r4:848f8c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848f8c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0055e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a680c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfafd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad378c r4:84ad3400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad378c r4:8479ca00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848f8c00 r8:8479ca2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479ca00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479ca00 r8:8027ed34 r7:e0051e60 r6:84727800 r5:848f8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0055fb0 to 0xe0055ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68000
INFO: task kworker/1:112:3564 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c7874000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:113:3566 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:113 state:D stack:0 pid:3566 tgid:3566 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0059d84 r8:00000002 r7:60000013 r6:e0059d8c r5:848f9800
r4:848f9800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848f9800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0059e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb2f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad3b8c r4:84ad3800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad3b8c r4:8479ca80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848f9800 r8:8479caac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479ca80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479ca80 r8:8027ed34 r7:e0051e60 r6:84727880 r5:848f9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0059fb0 to 0xe0059ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a681c0
INFO: task kworker/1:113:3566 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c7ae6000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:114:3567 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:114 state:D stack:0 pid:3567 tgid:3567 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e005dd84 r8:00000002 r7:60000113 r6:e005dd8c r5:848fa400
r4:848fa400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848fa400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e005de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb51000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad3f8c r4:84ad3c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad3f8c r4:8479cb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848fa400 r8:8479cb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479cb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479cb00 r8:8027ed34 r7:e0051e60 r6:84727900 r5:848fa400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe005dfb0 to 0xe005dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a681c0
INFO: task kworker/1:114:3567 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c7cf0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:115:3570 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:115 state:D stack:0 pid:3570 tgid:3570 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0069d84 r8:00000002 r7:60000013 r6:e0069d8c r5:848fc800
r4:848fc800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848fc800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0069e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68500
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb63000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad438c r4:84ad4000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad438c r4:8479c700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848fc800 r8:8479c72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479c700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479c700 r8:8027ed34 r7:e0051e60 r6:84727980 r5:848fc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0069fb0 to 0xe0069ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68340
INFO: task kworker/1:115:3570 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c824c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:116:3571 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:116 state:D stack:0 pid:3571 tgid:3571 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e006dd84 r8:00000002 r7:60000013 r6:e006dd8c r5:848fb000
r4:848fb000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848fb000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e006de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68640
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd11000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad478c r4:84ad4400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad478c r4:8479cb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848fb000 r8:8479cbac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479cb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479cb80 r8:8027ed34 r7:e0051e60 r6:84727a00 r5:848fb000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe006dfb0 to 0xe006dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68440
INFO: task kworker/1:116:3571 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c85b1000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:117:3573 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:117 state:D stack:0 pid:3573 tgid:3573 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0075d84 r8:00000002 r7:60000013 r6:e0075d8c r5:848fbc00
r4:848fbc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848fbc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0075e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd3d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad4b8c r4:84ad4800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad4b8c r4:8479cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848fbc00 r8:8479cc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479cc00 r8:8027ed34 r7:e0051e60 r6:84727a80 r5:848fbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0075fb0 to 0xe0075ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68580
INFO: task kworker/1:117:3573 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c883b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:118:3576 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:118 state:D stack:0 pid:3576 tgid:3576 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0089d84 r8:00000002 r7:60000113 r6:e0089d8c r5:848fd400
r4:848fd400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848fd400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0089e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68880
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd5b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad4f8c r4:84ad4c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad4f8c r4:8479cc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848fd400 r8:8479ccac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479cc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479cc80 r8:8027ed34 r7:e0051e60 r6:84727b00 r5:848fd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0089fb0 to 0xe0089ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68840
INFO: task kworker/1:118:3576 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c8acd000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:119:3578 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:119 state:D stack:0 pid:3578 tgid:3578 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0091d84 r8:00000002 r7:60000113 r6:e0091d8c r5:849a8000
r4:849a8000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849a8000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0091e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a689c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd6d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad538c r4:84ad5000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad538c r4:8479cd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849a8000 r8:8479cdac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479cd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479cd80 r8:8027ed34 r7:e0051e60 r6:84727b80 r5:849a8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0091fb0 to 0xe0091ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68980
INFO: task kworker/1:119:3578 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c8f28000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:120:3579 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:120 state:D stack:0 pid:3579 tgid:3579 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0095d84 r8:00000002 r7:60000113 r6:e0095d8c r5:849a8c00
r4:849a8c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849a8c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0095e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68b40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd89000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad578c r4:84ad5400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad578c r4:8479ce00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849a8c00 r8:8479ce2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479ce00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479ce00 r8:8027ed34 r7:e0051e60 r6:84727c00 r5:849a8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0095fb0 to 0xe0095ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68900
INFO: task kworker/1:120:3579 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c911f000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:121:3582 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:121 state:D stack:0 pid:3582 tgid:3582 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e00a1d84 r8:00000002 r7:60000013 r6:e00a1d8c r5:849ab000
r4:849ab000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849ab000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68d80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e007f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad5f8c r4:84ad5c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad5f8c r4:8479cd00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849ab000 r8:8479cd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479cd00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479cd00 r8:8027ed34 r7:e0051e60 r6:84727c80 r5:849ab000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00a1fb0 to 0xe00a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68a80
INFO: task kworker/1:121:3582 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c93cd000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:122:3584 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:122 state:D stack:0 pid:3584 tgid:3584 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e00add84 r8:00000002 r7:60000113 r6:e00add8c r5:849abc00
r4:849abc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849abc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ade08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7d200
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03db000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad6f8c r4:84ad6c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad6f8c r4:8479ce80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849abc00 r8:8479ceac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479ce80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479ce80 r8:8027ed34 r7:e00a1e60 r6:84727d00 r5:849abc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00adfb0 to 0xe00adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68cc0
INFO: task kworker/1:122:3584 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c98e9000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:123:3585 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:123 state:D stack:0 pid:3585 tgid:3585 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03b5d84 r8:00000002 r7:60000113 r6:e03b5d8c r5:849ac800
r4:849ac800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849ac800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03b5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68ec0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00a5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad638c r4:84ad6000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad638c r4:8479cf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849ac800 r8:8479cf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479cf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479cf00 r8:8027ed34 r7:e00ade60 r6:84727d80 r5:849ac800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03b5fb0 to 0xe03b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68e80
INFO: task kworker/1:123:3585 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: c9ddd000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:124:3587 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:124 state:D stack:0 pid:3587 tgid:3587 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03c5d84 r8:00000002 r7:60000113 r6:e03c5d8c r5:849a9800
r4:849a9800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849a9800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03c5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a68e00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03bb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad678c r4:84ad6400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad678c r4:8479cf80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849a9800 r8:8479cfac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8479cf80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8479cf80 r8:8027ed34 r7:e00ade60 r6:84727e00 r5:849a9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03c5fb0 to 0xe03c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a68e00
INFO: task kworker/1:124:3587 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: ca34e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:125:3589 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:125 state:D stack:0 pid:3589 tgid:3589 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03d5d84 r8:00000002 r7:60000113 r6:e03d5d8c r5:849aa400
r4:849aa400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849aa400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03d5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7d000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03c9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad6b8c r4:84ad6800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad6b8c r4:84a7a100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849aa400 r8:84a7a12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a100 r8:8027ed34 r7:e00ade60 r6:84727e80 r5:849aa400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03d5fb0 to 0xe03d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7d040
INFO: task kworker/1:125:3589 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: ca497000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:126:3591 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:126 state:D stack:0 pid:3591 tgid:3591 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03e5d84 r8:00000002 r7:60000013 r6:e03e5d8c r5:849ad400
r4:849ad400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849ad400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03e5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7d780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e040b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad7f8c r4:84ad7c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad7f8c r4:84a7a180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849ad400 r8:84a7a1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a180 r8:8027ed34 r7:e00ade60 r6:84727f00 r5:849ad400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03e5fb0 to 0xe03e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7d1c0
INFO: task kworker/1:126:3591 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: ca906000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:127:3593 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:127 state:D stack:0 pid:3593 tgid:3593 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03f1d84 r8:00000002 r7:60000113 r6:e03f1d8c r5:849ae000
r4:849ae000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849ae000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03f1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7d340
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03e1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad738c r4:84ad7000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad738c r4:84a7a000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849ae000 r8:84a7a02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a000 r8:8027ed34 r7:e03e5e60 r6:84727f80 r5:849ae000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03f1fb0 to 0xe03f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7d300
INFO: task kworker/1:127:3593 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cabf7000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:128:3595 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:128 state:D stack:0 pid:3595 tgid:3595 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfffdd84 r8:00000002 r7:60000113 r6:dfffdd8c r5:84b38000
r4:84b38000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b38000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfffde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7d480
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b38000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03f7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad778c r4:84ad7400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad778c r4:84a7a200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b38000 r8:84a7a22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a200 r8:8027ed34 r7:e03e5e60 r6:84a7a280 r5:84b38000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfffdfb0 to 0xdfffdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7d440
INFO: task kworker/1:128:3595 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: caec6000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:129:3597 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:129 state:D stack:0 pid:3597 tgid:3597 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0401d84 r8:00000002 r7:60000113 r6:e0401d8c r5:84b3b000
r4:84b3b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b3b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0401e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7d600
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b3b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03fd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad7b8c r4:84ad7800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad7b8c r4:84a7a080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b3b000 r8:84a7a0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a080 r8:8027ed34 r7:e03e5e60 r6:84a7a380 r5:84b3b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0401fb0 to 0xe0401ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7d5c0
INFO: task kworker/1:129:3597 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cb12e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:130:3600 blocked for more than 454 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:130 state:D stack:0 pid:3600 tgid:3600 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0409d84 r8:00000002 r7:60000113 r6:e0409d8c r5:84b3bc00
r4:84b3bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b3bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0409e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7da80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b3bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e041f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad878c r4:84ad8400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad878c r4:84a7a300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b3bc00 r8:84a7a32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a300 r8:8027ed34 r7:e03e5e60 r6:84a7a400 r5:84b3bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0409fb0 to 0xe0409ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7d6c0
INFO: task kworker/1:130:3600 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cb3ac000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:131:3602 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:131 state:D stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0415d84 r8:00000002 r7:60000113 r6:e0415d8c r5:84b3c800
r4:84b3c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b3c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0415e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7d8c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b3c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0411000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad838c r4:84ad8000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad838c r4:84a7a480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b3c800 r8:84a7a4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a480 r8:8027ed34 r7:e0409e60 r6:84a7a500 r5:84b3c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0415fb0 to 0xe0415ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7d800
INFO: task kworker/1:131:3602 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cb77c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:132:3605 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:132 state:D stack:0 pid:3605 tgid:3605 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e041dd84 r8:00000002 r7:60000113 r6:e041dd8c r5:84b3d400
r4:84b3d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b3d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e041de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7dbc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b3d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0425000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad8b8c r4:84ad8800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad8b8c r4:84a7a580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b3d400 r8:84a7a5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a580 r8:8027ed34 r7:e0409e60 r6:84a7a600 r5:84b3d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe041dfb0 to 0xe041dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7d9c0
INFO: task kworker/1:132:3605 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cba0a000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:133:3606 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:133 state:D stack:0 pid:3606 tgid:3606 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0011d84 r8:00000002 r7:60000113 r6:e0011d8c r5:84b3e000
r4:84b3e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b3e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0011e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7dd80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0433000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad8f8c r4:84ad8c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad8f8c r4:84a7a680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b3e000 r8:84a7a6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a680 r8:8027ed34 r7:e041de60 r6:84a7a700 r5:84b3e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0011fb0 to 0xe0011ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7db00
INFO: task kworker/1:133:3606 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cbcb3000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:134:3609 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:134 state:D stack:0 pid:3609 tgid:3609 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0429d84 r8:00000002 r7:60000013 r6:e0429d8c r5:84b3ec00
r4:84b3ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b3ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0429e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a65bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0447000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad978c r4:84ad9400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad978c r4:84a7a780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b3ec00 r8:84a7a7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a780 r8:8027ed34 r7:e0011e60 r6:84a7a800 r5:84b3ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0429fb0 to 0xe0429ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7dcc0
INFO: task kworker/1:134:3609 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cc05c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:135:3610 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:135 state:D stack:0 pid:3610 tgid:3610 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e043dd84 r8:00000002 r7:60000113 r6:e043dd8c r5:84b39800
r4:84b39800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b39800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e043de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7dec0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b39800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0439000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad938c r4:84ad9000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad938c r4:84a7a880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b39800 r8:84a7a8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a880 r8:8027ed34 r7:e0429e60 r6:84a7a900 r5:84b39800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe043dfb0 to 0xe043dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7de00
INFO: task kworker/1:135:3610 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cc05c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:136:3612 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:136 state:D stack:0 pid:3612 tgid:3612 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0445d84 r8:00000002 r7:60000013 r6:e0445d8c r5:84b3a400
r4:84b3a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b3a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0445e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a95000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b3a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0457000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad9b8c r4:84ad9800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad9b8c r4:84a7a980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b3a400 r8:84a7a9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7a980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7a980 r8:8027ed34 r7:e0429e60 r6:84a7aa80 r5:84b3a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0445fb0 to 0xe0445ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a65cc0
INFO: task kworker/1:136:3612 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cc3bc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:137:3615 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:137 state:D stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0461d84 r8:00000002 r7:60000113 r6:e0461d8c r5:84b40c00
r4:84b40c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b40c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0461e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a95480
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0467000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ada38c r4:84ada000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ada38c r4:84a7aa00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b40c00 r8:84a7aa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7aa00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7aa00 r8:8027ed34 r7:e0445e60 r6:84a7ab80 r5:84b40c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0461fb0 to 0xe0461ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a95100
INFO: task kworker/1:137:3615 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cc5ae000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:138:3617 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:138 state:D stack:0 pid:3617 tgid:3617 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0431d84 r8:00000002 r7:60000113 r6:e0431d8c r5:84b41800
r4:84b41800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b41800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0431e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a95340
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b41800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e045d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ad9f8c r4:84ad9c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ad9f8c r4:84a7ab00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b41800 r8:84a7ab2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7ab00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7ab00 r8:8027ed34 r7:e0461e60 r6:84a7ac80 r5:84b41800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0431fb0 to 0xe0431ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a950c0
INFO: task kworker/1:138:3617 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cc7a8000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:139:3619 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:139 state:D stack:0 pid:3619 tgid:3619 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0451d84 r8:00000002 r7:60000113 r6:e0451d8c r5:84b42400
r4:84b42400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b42400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0451e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a95580
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b42400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e046d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ada78c r4:84ada400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ada78c r4:84a7ac00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b42400 r8:84a7ac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7ac00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7ac00 r8:8027ed34 r7:e0461e60 r6:84a7ae00 r5:84b42400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0451fb0 to 0xe0451ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a955c0
INFO: task kworker/1:139:3619 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
1d20: cc9dc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:140:3621 blocked for more than 455 seconds.
r5:84b43000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0471e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a958c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b43000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0481000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adaf8c r4:84adac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a7ad80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b43000 r8:84a7adac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7ad80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7ad80 r8:8027ed34 r7:e0451e60 r6:84a7ad00 r5:84b43000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0471fb0 to 0xe0471ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a954c0
INFO: task kworker/1:140:3621 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cce0a000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:141:3623 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0479d84 r8:00000002 r7:60000013 r6:e0479d8c r5:84b43c00
r4:84b43c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b43c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0479e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a95740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e047b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adab8c r4:84ada800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84adab8c r4:84a7ae80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b43c00 r8:84a7aeac r7:82804d40 r6:ddde2d40 r5:ddde2d60
9fa0: 00000000 00000000 00000000 00000000
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:800d0013 r4:80239bd0
r4:00000000
r5:00001000 r4:dfc9b000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:142:3625 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:142 state:D stack:0 pid:3625 tgid:3625 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0485d84 r8:00000002 r7:60000113 r6:e0485d8c r5:84b44800
r4:84b44800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b44800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0485e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a95a80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b44800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e048f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adb38c r4:84adb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a7af00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b44800 r8:84a7af2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a7af00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a7af00 r8:8027ed34 r7:e0471e60 r6:84a57f80 r5:84b44800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0485fb0 to 0xe0485ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a95800
INFO: task kworker/1:142:3625 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cd30c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
Exception stack(0xdff41fb0 to 0xdff41ff8)
r4:84b733c0
INFO: task kworker/1:143:3627 blocked for more than 455 seconds.
r4:84b45400
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e048de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r4:00000000
r5:00001000 r4:e0495000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84adb78c r4:84adb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84adb78c r4:84a9d100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b45400 r8:84a9d12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9d100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9d100 r8:8027ed34 r7:e0485e60 r6:84a9d080 r5:84b45400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe048dfb0 to 0xe048dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a959c0
INFO: task kworker/1:143:3627 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cd7ac000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:144:3629 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:144 state:D stack:0 pid:3629 tgid:3629 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e04add84 r8:00000002 r7:60000113 r6:e04add8c r5:84b46000
r4:84b46000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b46000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xe04adfb0 to 0xe04adff8)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:145:3631 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:145 state:D stack:0 pid:3631 tgid:3631 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e04b5d84 r8:00000002 r7:60000113 r6:e04b5d8c r5:84b46c00
r4:84b46c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b46c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a95f00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b46c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04bd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:84b46c00 r8:84a9d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
5fa0: 00000000 00000000 00000000 00000000
r4:84a95c80
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cdd5d000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
r5:84b40000 r4:829185c0
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r9:83018205 r8:84b40000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xe04c1fb0 to 0xe04c1ff8)
r4:84a95e40
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: ce0f2000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:147:3635 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:147 state:D stack:0 pid:3635 tgid:3635 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e04c9d84 r8:00000002 r7:60000113 r6:e04c9d8c r5:84b2ec00
r4:84b2ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b2ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c9e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84a9d380 r8:8027ed34 r7:e04c1e60 r6:84a9d500 r5:84b2ec00
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: ce573000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:148:3636 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:148 state:D stack:0 pid:3636 tgid:3636 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:84a9d480
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04e1fb0 to 0xe04e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b6c0c0
INFO: task kworker/1:148:3636 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: ce7aa000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:149:3639 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:149 state:D stack:0 pid:3639 tgid:3639 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:829185c4 r9:e04d9d84 r8:00000002 r7:60000113 r6:e04d9d8c r5:85028c00
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6c480
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85028c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04f5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b78f8c r4:84b78c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b78f8c r4:84a9d700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85028c00 r8:84a9d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9d700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9d700 r8:8027ed34 r7:e04e1e60 r6:84a9d780 r5:85028c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04d9fb0 to 0xe04d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84b6c200
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff41d20 to 0xdff41d68)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:150:3641 blocked for more than 455 seconds.
r4:85029800
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6c340
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85029800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e050f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b7938c r4:84b79000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b7938c r4:84a9d600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85029800 r8:84a9d62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9d600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9d600 r8:8027ed34 r7:e04d9e60 r6:84a9d800 r5:85029800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0505fb0 to 0xe0505ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b6c340
INFO: task kworker/1:150:3641 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cef83000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
r5:800d0013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r5:00001000 r4:dfc9b000
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.16.0-rc1-syzkaller #0
r10:829185c4 r9:e0521d84 r8:00000002 r7:60000113 r6:e0521d8c r5:8502a400
r4:8502a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8502a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0521e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6c740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8502a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0519000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b7978c r4:84b79400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b7978c r4:84a9d900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8502a400 r8:84a9d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9d900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9d900 r8:8027ed34 r7:e0505e60 r6:84a9d580 r5:8502a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0521fb0 to 0xe0521ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b6c4c0
INFO: task kworker/1:151:3643 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cf0d6000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:152:3645 blocked for more than 455 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0529d84 r8:00000002 r7:60000013 r6:e0529d8c r5:8502b000
r4:8502b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8502b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0529e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6ca00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8502b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0541000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b79f8c r4:84b79c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b79f8c r4:84a9da00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8502b000 r8:84a9da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9da00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9da00 r8:8027ed34 r7:e0521e60 r6:84a9d880 r5:8502b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0529fb0 to 0xe0529ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b6c680
INFO: task kworker/1:152:3645 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cf3d7000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r10:829185c4 r9:e053dd84 r8:00000002 r7:60000113 r6:e053dd8c r5:8502bc00
r4:8502bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8502bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6c900
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8502bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000
r5:00001000 r4:e0533000
r7:ddde2d40 r6:83018200 r5:84b79b8c r4:84a9db00
r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cf715000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Not tainted 6.16.0-rc1-syzkaller #0
r10:829185c4 r9:e0549d84 r8:00000002 r7:60000013 r6:e0549d8c r5:8502c800
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6c940
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8502c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0557000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b7a38c r4:84b7a000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b7a38c r4:84a9d980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8502c800 r8:84a9d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9d980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9d980 r8:8027ed34 r7:e0529e60 r6:84a9da80 r5:8502c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0549fb0 to 0xe0549ff8)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:82abe1e4
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:155:3651 blocked for more than 455 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:155 state:D stack:0 pid:3651 tgid:3651 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0555d84 r8:00000002 r7:60000113 r6:e0555d8c r5:8502d400
r4:8502d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8502d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0555e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6cd00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8502d400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df883000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b7a78c r4:84b7a400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b7a78c r4:84a9dc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8502d400 r8:84a9dc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9dc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9dc00 r8:8027ed34 r7:e0549e60 r6:84a9b000 r5:8502d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0555fb0 to 0xe0555ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b6cb40
INFO: task kworker/1:155:3651 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: cfda4000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
r4:dff41dc0
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:156 state:D stack:0 pid:3653 tgid:3653 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe65e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a65780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbc1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b7af8c r4:84b7ac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b7af8c r4:84a9dd00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849aec00 r8:84a9dd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9dd00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9dd00 r8:8027ed34 r7:e0555e60 r6:84a9b100 r5:849aec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfe65fb0 to 0xdfe65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b6cc40
INFO: task kworker/1:156:3653 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d0118000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:157:3654 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:157 state:D stack:0 pid:3654 tgid:3654 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dfe8dd84 r8:00000002 r7:60000013 r6:dfe8dd8c r5:848fec00
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:848fec00 r8:84a9ddac r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:800d0013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:158:3658 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:158 state:D stack:0 pid:3658 tgid:3658 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0565d84 r8:00000002 r7:60000113 r6:e0565d8c r5:848fe000
r4:848fe000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848fe000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0565e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9a080
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbe9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b7b38c r4:84b7b000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b7b38c r4:84a9de00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:159:3660 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:159 state:D stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:dff8dd84 r8:00000002 r7:60000113 r6:dff8dd8c r5:84840c00
r4:84840c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84840c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff8de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9acc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84840c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdb9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba178c r4:84ba1400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84840c00 r8:84a9deac r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfa0: 00000000 00000000 00000000 00000000
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:160:3662 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:160 state:D stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:84842400
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9a200
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84842400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc11000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b7b78c r4:84b7b400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b7b78c r4:84a9df00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84842400 r8:84a9df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9df00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9df00 r8:8027ed34 r7:dff8de60 r6:84a9b200 r5:84842400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe056dfb0 to 0xe056dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b9a1c0
INFO: task kworker/1:160:3662 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d0b93000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:161:3663 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0571d84 r8:00000002 r7:60000013 r6:e0571d8c r5:84840000
r4:84840000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84840000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0571e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9a140
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84840000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
r5:84b7bb8c r4:84b7b800
r4:84a9df80
Exception stack(0xe0571fb0 to 0xe0571ff8)
r4:84b9a140
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:162 state:D stack:0 pid:3665 tgid:3665 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0579d84 r8:00000002 r7:60000013 r6:e0579d8c r5:84841800
r4:84841800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84841800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0579e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9a400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84841800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc61000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b7bf8c r4:84b7bc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b7bf8c r4:85002100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84841800 r8:8500212c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002100 r8:8027ed34 r7:dff8de60 r6:84a9b380 r5:84841800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0579fb0 to 0xe0579ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b9a400
INFO: task kworker/1:162:3665 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d153a000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:163:3667 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:163 state:D stack:0 pid:3667 tgid:3667 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0581d84 r8:00000002 r7:60000113 r6:e0581d8c r5:84843000
r4:84843000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9a600
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:85002000
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b9a3c0
INFO: task kworker/1:163:3667 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d1af7000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:164:3670 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:164 state:D stack:0 pid:3670 tgid:3670 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0589d84 r8:00000002 r7:60000013 r6:e0589d8c r5:84845400
r4:84845400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84845400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0589e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9a780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84845400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcad000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba078c r4:84ba0400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba078c r4:85002180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84845400 r8:850021ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002180 r8:8027ed34 r7:dff8de60 r6:84a9b480 r5:84845400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0589fb0 to 0xe0589ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b9a6c0
INFO: task kworker/1:164:3670 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d1e35000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:165:3671 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:165 state:D stack:0 pid:3671 tgid:3671 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e058dd84 r8:00000002 r7:60000013 r6:e058dd8c r5:84846000
r4:84846000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84846000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9a8c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84846000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba0b8c r4:84ba0800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba0b8c r4:85002280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84846000 r8:850022ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002280 r8:8027ed34 r7:dff8de60 r6:84a9b500 r5:84846000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe058dfb0 to 0xe058dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b9a6c0
INFO: task kworker/1:165:3671 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d1fcb000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:166:3673 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:166 state:D stack:0 pid:3673 tgid:3673 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0595d84 r8:00000002 r7:60000113 r6:e0595d8c r5:84843c00
r4:84843c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84843c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0595e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9aa40
r4:00000000
r9:83018205 r8:84843c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
r5:84ba0f8c r4:84ba0c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84843c00 r8:850020ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002080 r8:8027ed34 r7:dff8de60 r6:84a9b580 r5:84843c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0595fb0 to 0xe0595ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b9a800
INFO: task kworker/1:166:3673 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d1fcb000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:167:3675 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:167 state:D stack:0 pid:3675 tgid:3675 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e057dd84 r8:00000002 r7:60000113 r6:e057dd8c r5:8502ec00
r4:8502ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8502ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e057de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9ab40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8502ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfda5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba138c r4:84ba1000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba138c r4:85002200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8502ec00 r8:8500222c r7:82804d40 r6:ddde2d40 r5:ddde2d60
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:168:3678 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:168 state:D stack:0 pid:3678 tgid:3678 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e059dd84 r8:00000002 r7:60000013 r6:e059dd8c r5:8502e000
r4:8502e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8502e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e059de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9aec0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8502e000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfde1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba1b8c r4:84ba1800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba1b8c r4:85002380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8502e000 r8:850023ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002380 r8:8027ed34 r7:dff8de60 r6:85002480 r5:8502e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe059dfb0 to 0xe059dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b9aa80
INFO: task kworker/1:168:3678 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d25b6000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r5:84b48000 r4:829185c0
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r9:83018205 r8:84b48000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdf7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba1f8c r4:84ba1c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba1f8c r4:85002400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b48000 r8:8500242c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002400 r8:8027ed34 r7:e059de60 r6:85002500 r5:84b48000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04e5fb0 to 0xe04e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b9ac00
INFO: task kworker/1:169:3679 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d2783000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
r4:dff41dc0
r4:00000000
r5:00001000 r4:dfc9b000
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:170 state:D stack:0 pid:3682 tgid:3682 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a1e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe05000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba238c r4:84ba2000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba238c r4:85002580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b48c00 r8:850025ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002580 r8:8027ed34 r7:e04e5e60 r6:85002600 r5:84b48c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05a1fb0 to 0xe05a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b9af00
INFO: task kworker/1:170:3682 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d29a9000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:171:3684 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:171 state:D stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05a9d84 r8:00000002 r7:60000013 r6:e05a9d8c r5:84b49800
r4:84b49800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b49800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013440
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b49800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe3d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba2b8c r4:84ba2800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba2b8c r4:85002680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b49800 r8:850026ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002680 r8:8027ed34 r7:e05a1e60 r6:85002780 r5:84b49800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05a9fb0 to 0xe05a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85013080
INFO: task kworker/1:171:3684 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d2c0c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:172:3685 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:172 state:D stack:0 pid:3685 tgid:3685 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05a5d84 r8:00000002 r7:60000113 r6:e05a5d8c r5:84b4a400
r4:84b4a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b4a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850132c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe23000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba278c r4:84ba2400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba278c r4:85002700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b4a400 r8:8500272c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002700 r8:8027ed34 r7:e05a9e60 r6:85002800 r5:84b4a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05a5fb0 to 0xe05a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:85013080
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d60: 800d0013 ffffffff
r4:dff41dc0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:173:3688 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:173 state:D stack:0 pid:3688 tgid:3688 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05add84 r8:00000002 r7:60000013 r6:e05add8c r5:84b4bc00
r4:84b4bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b4bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ade08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b4bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe79000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba338c r4:84ba3000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba338c r4:85002880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b4bc00 r8:850028ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002880 r8:8027ed34 r7:e05a9e60 r6:85002980 r5:84b4bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05adfb0 to 0xe05adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85013380
INFO: task kworker/1:173:3688 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d3268000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
r4:dff41dc0
r4:00000000
r5:00001000 r4:dfc9b000
r5:84acaf8c r4:84acac00
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:174:3690 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:174 state:D stack:0 pid:3690 tgid:3690 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05b5d84 r8:00000002 r7:60000113 r6:e05b5d8c r5:84b4c800
r4:84b4c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b4c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b4c800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe59000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba2f8c r4:84ba2c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba2f8c r4:85002900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b4c800 r8:8500292c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002900 r8:8027ed34 r7:e05ade60 r6:85002a00 r5:84b4c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05b5fb0 to 0xe05b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85013380
INFO: task kworker/1:174:3690 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d3db4000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:175:3692 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:175 state:D stack:0 pid:3692 tgid:3692 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05b9d84 r8:00000002 r7:60000113 r6:e05b9d8c r5:84b4d400
r4:84b4d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b4d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013880
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe91000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba378c r4:84ba3400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba378c r4:85002a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b4d400 r8:85002aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002a80 r8:8027ed34 r7:e05ade60 r6:85002b80 r5:84b4d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05b9fb0 to 0xe05b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85013680
INFO: task kworker/1:175:3692 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:176:3694 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:176 state:D stack:0 pid:3694 tgid:3694 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05c1d84 r8:00000002 r7:60000013 r6:e05c1d8c r5:84b4e000
r4:84b4e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b4e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c1e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:dff2f000
r5:84ba3f8c r4:84ba3c00
r10:61c88647 r9:84b4e000 r8:85002b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xe05c1fb0 to 0xe05c1ff8)
r4:85013800
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:177:3696 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:177 state:D stack:0 pid:3696 tgid:3696 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05c5d84 r8:00000002 r7:60000113 r6:e05c5d8c r5:84b4ec00
r4:84b4ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b4ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b4ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeab000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba3b8c r4:84ba3800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba3b8c r4:85002c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b4ec00 r8:85002c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002c00 r8:8027ed34 r7:e05c1e60 r6:85002d80 r5:84b4ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05c5fb0 to 0xe05c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d4255000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:178:3698 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:178 state:D stack:0 pid:3698 tgid:3698 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05cdd84 r8:00000002 r7:60000013 r6:e05cdd8c r5:85030000
r4:85030000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85030000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05cde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85013cc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85030000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff3d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:85030000 r8:85002d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfa0: 00000000 00000000 00000000 00000000
r4:85013d00
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff41d20 to 0xdff41d68)
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:179:3700 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:179 state:D stack:0 pid:3700 tgid:3700 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05d1d84 r8:00000002 r7:60000013 r6:e05d1d8c r5:85030c00
r4:85030c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85030c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850221c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85030c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff63000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba878c r4:84ba8400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba878c r4:85002e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85030c00 r8:85002eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85002e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85002e80 r8:8027ed34 r7:e05cde60 r6:85002f00 r5:85030c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05d1fb0 to 0xe05d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85013c00
INFO: task kworker/1:179:3700 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d47e1000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:118:3702 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:118 state:D stack:0 pid:3702 tgid:3702 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05d9d84 r8:00000002 r7:60000113 r6:e05d9d8c r5:85032400
r4:85032400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85032400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85032400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff55000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84af6f8c r4:84af6c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84af6f8c r4:84a9b600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85032400 r8:84a9b62c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a9b600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9b600 r8:8027ed34 r7:dfff1e60 r6:85002f80 r5:85032400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05d9fb0 to 0xe05d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8472a940
INFO: task kworker/0:118:3702 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d49ad000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:180:3703 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:180 state:D stack:0 pid:3703 tgid:3703 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05ddd84 r8:00000002 r7:60000113 r6:e05ddd8c r5:85033000
r4:85033000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85033000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05dde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850226c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85033000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff9d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba8f8c r4:84ba8c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba8f8c r4:84a57e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85033000 r8:84a57e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a57e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a57e00 r8:8027ed34 r7:e05d1e60 r6:84a9dc80 r5:85033000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05ddfb0 to 0xe05ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85013ac0
INFO: task kworker/1:180:3703 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d4c66000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:181:3706 blocked for more than 456 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:181 state:D stack:0 pid:3706 tgid:3706 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05e5d84 r8:00000002 r7:60000113 r6:e05e5d8c r5:85033c00
r4:85033c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85033c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85022600
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85033c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff8f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba8b8c r4:84ba8800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba8b8c r4:8501c000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85033c00 r8:8501c02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c000 r8:8027ed34 r7:e05dde60 r6:8501c100 r5:85033c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05e5fb0 to 0xe05e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85022000
INFO: task kworker/1:181:3706 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d4efd000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:84b6f600
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:119 state:D stack:0 pid:3707 tgid:3707 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05edd84 r8:00000002 r7:60000013 r6:e05edd8c r5:85035400
r4:85035400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85035400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ede08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85035400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9df000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84af7f8c r4:84af7c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84af7f8c r4:84a9b700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85035400 r8:84a9b72c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a9b700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9b700 r8:8027ed34 r7:dfff1e60 r6:8501c080 r5:85035400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05edfb0 to 0xe05edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:800d0013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r5:00001000 r4:dfc9b000
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.16.0-rc1-syzkaller #0
Workqueue: events bpf_prog_free_deferred
r10:829185c4 r9:e05f1d84 r8:00000002 r7:60000113 r6:e05f1d8c r5:85031800
r4:85031800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85031800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71b40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85031800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df991000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84af7b8c r4:84af7800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84af7b8c r4:84a9b680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85031800 r8:84a9b6ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a9b680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9b680 r8:8027ed34 r7:e05ede60 r6:8501c180 r5:85031800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05f1fb0 to 0xe05f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b71100
INFO: task kworker/0:120:3708 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d54c7000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:182:3712 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:182 state:D stack:0 pid:3712 tgid:3712 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05e9d84 r8:00000002 r7:60000113 r6:e05e9d8c r5:85036000
r4:85036000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85036000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85022840
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85036000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffab000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba938c r4:84ba9000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba938c r4:8501c200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85036000 r8:8501c22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c200 r8:8027ed34 r7:e05dde60 r6:8501c280 r5:85036000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05e9fb0 to 0xe05e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850225c0
INFO: task kworker/1:182:3712 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d582c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:183:3714 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:183 state:D stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05d5d84 r8:00000002 r7:60000013 r6:e05d5d8c r5:85036c00
r4:85036c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85036c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85022980
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85036c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffb5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba978c r4:84ba9400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba978c r4:8501c300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85036c00 r8:8501c32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c300 r8:8027ed34 r7:e05e9e60 r6:8501c380 r5:85036c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05d5fb0 to 0xe05d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85022780
INFO: task kworker/1:183:3714 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d5b62000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:184:3715 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:184 state:D stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05c9d84 r8:00000002 r7:60000113 r6:e05c9d8c r5:85034800
r4:85034800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85034800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85022b80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85034800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffc3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba9b8c r4:84ba9800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba9b8c r4:8501c400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85034800 r8:8501c42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c400 r8:8027ed34 r7:e05d5e60 r6:8501c480 r5:85034800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05c9fb0 to 0xe05c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85022940
INFO: task kworker/1:184:3715 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d5e24000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:185:3719 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:185 state:D stack:0 pid:3719 tgid:3719 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0601d84 r8:00000002 r7:60000013 r6:e0601d8c r5:849da400
r4:849da400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849da400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0601e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85022c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849da400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffcd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84ba9f8c r4:84ba9c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84ba9f8c r4:8501c500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849da400 r8:8501c52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c500 r8:8027ed34 r7:e05c9e60 r6:84a9b780 r5:849da400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0601fb0 to 0xe0601ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85022ac0
INFO: task kworker/1:185:3719 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d5f19000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:186:3720 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:186 state:D stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0605d84 r8:00000002 r7:60000113 r6:e0605d8c r5:849db000
r4:849db000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849db000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85022e40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849db000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffdb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84baa38c r4:84baa000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84baa38c r4:8501c580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849db000 r8:8501c5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c580 r8:8027ed34 r7:e0601e60 r6:84a9b800 r5:849db000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0605fb0 to 0xe0605ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85022ac0
INFO: task kworker/1:186:3720 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d63bd000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:187:3722 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:187 state:D stack:0 pid:3722 tgid:3722 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e060dd84 r8:00000002 r7:60000113 r6:e060dd8c r5:849dc800
r4:849dc800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849dc800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ed80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df8e3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84baa78c r4:84baa400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84baa78c r4:8501c600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849dc800 r8:8501c62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c600 r8:8027ed34 r7:e0605e60 r6:84a9b880 r5:849dc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe060dfb0 to 0xe060dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85022d80
INFO: task kworker/1:187:3722 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d6919000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:188:3723 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:188 state:D stack:0 pid:3723 tgid:3723 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0611d84 r8:00000002 r7:60000113 r6:e0611d8c r5:849dd400
r4:849dd400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849dd400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0611e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85022e80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb87000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84baaf8c r4:84baac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84baaf8c r4:8501c700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849dd400 r8:8501c72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c700 r8:8027ed34 r7:e060de60 r6:84a9b900 r5:849dd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0611fb0 to 0xe0611ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85022d80
INFO: task kworker/1:188:3723 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d6a1a000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:121:3728 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:121 state:D stack:0 pid:3728 tgid:3728 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05fdd84 r8:00000002 r7:60000113 r6:e05fdd8c r5:849de000
r4:849de000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849de000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05fde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71d80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849de000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa23000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:847d238c r4:847d2000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:847d238c r4:84a9b980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849de000 r8:84a9b9ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a9b980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9b980 r8:8027ed34 r7:e05ede60 r6:84a9ba00 r5:849de000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05fdfb0 to 0xe05fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b71bc0
INFO: task kworker/0:121:3728 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d6ff3000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:122:3729 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:122 state:D stack:0 pid:3729 tgid:3729 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e05f9d84 r8:00000002 r7:60000013 r6:e05f9d8c r5:849dec00
r4:849dec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849dec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71cc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa51000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:847d1f8c r4:847d1c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:847d1f8c r4:84a9ba80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849dec00 r8:84a9baac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a9ba80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9ba80 r8:8027ed34 r7:e05fde60 r6:84a9bb00 r5:849dec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05f9fb0 to 0xe05f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b71bc0
INFO: task kworker/0:122:3729 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d728e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:189:3731 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:189 state:D stack:0 pid:3731 tgid:3731 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0061d84 r8:00000002 r7:60000113 r6:e0061d8c r5:849dbc00
r4:849dbc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849dbc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0061e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e8c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd91000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84baab8c r4:84baa800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84baab8c r4:8501c680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849dbc00 r8:8501c6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c680 r8:8027ed34 r7:e0611e60 r6:84a9bb80 r5:849dbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0061fb0 to 0xe0061ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501e040
INFO: task kworker/1:189:3731 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d7880000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:123:3733 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:123 state:D stack:0 pid:3733 tgid:3733 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0079d84 r8:00000002 r7:60000113 r6:e0079d8c r5:849d8c00
r4:849d8c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849d8c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0079e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa8f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:847d1b8c r4:847d1800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:847d1b8c r4:84a9bc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849d8c00 r8:84a9bcac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a9bc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9bc80 r8:8027ed34 r7:e05f9e60 r6:84a9bd00 r5:849d8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0079fb0 to 0xe0079ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b71ec0
INFO: task kworker/0:123:3733 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d79b0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:124:3735 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:124 state:D stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e007dd84 r8:00000002 r7:60000113 r6:e007dd8c r5:849d9800
r4:849d9800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849d9800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e007de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71380
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfab5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbc38c r4:84bbc000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbc38c r4:84a9bc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849d9800 r8:84a9bc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a9bc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9bc00 r8:8027ed34 r7:e0079e60 r6:84a9be80 r5:849d9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe007dfb0 to 0xe007dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b71680
INFO: task kworker/0:124:3735 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d7b1c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:125:3736 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:125 state:D stack:0 pid:3736 tgid:3736 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0099d84 r8:00000002 r7:60000113 r6:e0099d8c r5:849d8000
r4:849d8000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849d8000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0099e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472aa00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfae5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbc78c r4:84bbc400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbc78c r4:84a9be00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849d8000 r8:84a9be2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a9be00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9be00 r8:8027ed34 r7:e007de60 r6:84a9bd80 r5:849d8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0099fb0 to 0xe0099ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b71680
INFO: task kworker/0:125:3736 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d80be000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:126:3739 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:126 state:D stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e008dd84 r8:00000002 r7:60000013 r6:e008dd8c r5:84844800
r4:84844800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84844800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d0c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84844800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb23000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbcb8c r4:84bbc800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbcb8c r4:85021100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84844800 r8:8502112c r7:82804d40 r6:dddced40 r5:dddced60
r4:85021100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021100 r8:8027ed34 r7:e0099e60 r6:85021000 r5:84844800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe008dfb0 to 0xe008dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8472a680
INFO: task kworker/0:126:3739 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d8397000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:127:3741 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:127 state:D stack:0 pid:3741 tgid:3741 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03d9d84 r8:00000002 r7:60000113 r6:e03d9d8c r5:84846c00
r4:84846c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84846c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03d9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d3c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84846c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd0f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbd38c r4:84bbd000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbd38c r4:85021080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84846c00 r8:850210ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85021080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021080 r8:8027ed34 r7:e008de60 r6:85021200 r5:84846c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03d9fb0 to 0xe03d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d000
INFO: task kworker/0:127:3741 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d868f000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:128:3742 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:128 state:D stack:0 pid:3742 tgid:3742 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e03e9d84 r8:00000002 r7:60000113 r6:e03e9d8c r5:84888000
r4:84888000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84888000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03e9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d240
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84888000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb59000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbcf8c r4:84bbcc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbcf8c r4:85021180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84888000 r8:850211ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85021180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021180 r8:8027ed34 r7:e03d9e60 r6:85021300 r5:84888000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03e9fb0 to 0xe03e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d200
INFO: task kworker/0:128:3742 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d8b1c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:129:3745 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:129 state:D stack:0 pid:3745 tgid:3745 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0615d84 r8:00000002 r7:60000013 r6:e0615d8c r5:84888c00
r4:84888c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84888c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d9c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84888c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfff9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbdf8c r4:84bbdc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbdf8c r4:85021280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84888c00 r8:850212ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85021280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021280 r8:8027ed34 r7:e03d9e60 r6:85021400 r5:84888c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0615fb0 to 0xe0615ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d300
INFO: task kworker/0:129:3745 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d8c94000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:130:3747 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:130 state:D stack:0 pid:3747 tgid:3747 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0619d84 r8:00000002 r7:60000113 r6:e0619d8c r5:84889800
r4:84889800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84889800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0619e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84889800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd3f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbd78c r4:84bbd400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbd78c r4:85021380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84889800 r8:850213ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85021380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021380 r8:8027ed34 r7:e0615e60 r6:85021500 r5:84889800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0619fb0 to 0xe0619ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d500
INFO: task kworker/0:130:3747 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d9048000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:131:3748 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:131 state:D stack:0 pid:3748 tgid:3748 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e061dd84 r8:00000002 r7:60000013 r6:e061dd8c r5:8488a400
r4:8488a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8488a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d6c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8488a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd65000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbdb8c r4:84bbd800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbdb8c r4:85021480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8488a400 r8:850214ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85021480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021480 r8:8027ed34 r7:e0615e60 r6:85021600 r5:8488a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe061dfb0 to 0xe061dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d600
INFO: task kworker/0:131:3748 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d934f000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:132:3750 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:132 state:D stack:0 pid:3750 tgid:3750 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0625d84 r8:00000002 r7:60000013 r6:e0625d8c r5:8488bc00
r4:8488bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8488bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0625e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501dcc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8488bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0027000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbe78c r4:84bbe400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbe78c r4:85021580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8488bc00 r8:850215ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85021580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021580 r8:8027ed34 r7:e0615e60 r6:85021680 r5:8488bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0625fb0 to 0xe0625ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501d780
INFO: task kworker/0:132:3750 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d9804000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:133:3753 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:133 state:D stack:0 pid:3753 tgid:3753 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0629d84 r8:00000002 r7:60000013 r6:e0629d8c r5:8488b000
r4:8488b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8488b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501dbc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8488b000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced40 r6:83018000 r5:84bbe38c r4:85021700
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace:
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d9af8000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:134:3756 blocked for more than 457 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:134 state:D stack:0 pid:3756 tgid:3756 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03cde08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:85021780 r8:8027ed34 r7:e0625e60 r6:85021900 r5:8488d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe03cdfb0 to 0xe03cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501dd80
INFO: task kworker/0:134:3756 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: d9f98000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:8488e000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r9:83018005 r8:8488e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbf78c r4:85021880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8488e000 r8:850218ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85021880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021880 r8:8027ed34 r7:e03cde60 r6:85021980 r5:8488e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe062dfb0 to 0xe062dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501dd00
INFO: task kworker/0:135:3758 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: da23a000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:136:3760 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:136 state:D stack:0 pid:3760 tgid:3760 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0631d84 r8:00000002 r7:60000113 r6:e0631d8c r5:8488ec00
r4:8488ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8488ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501df80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8488ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0063000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbef8c r4:84bbec00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbef8c r4:85021a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8488ec00 r8:85021a2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85021a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021a00 r8:8027ed34 r7:e062de60 r6:85021b00 r5:8488ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0631fb0 to 0xe0631ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff41d20 to 0xdff41d68)
r4:82abe1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r5:00001000 r4:dfc9b000
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:137:3761 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:137 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0621d84 r8:00000002 r7:60000113 r6:e0621d8c r5:8488c800
r4:8488c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8488c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0621e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500a080
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8488c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0071000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbf38c r4:84bbf000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbf38c r4:85021a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8488c800 r8:85021aac r7:82804d40 r6:dddced40 r5:dddced60
r4:85021a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021a80 r8:8027ed34 r7:e062de60 r6:85021c00 r5:8488c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0621fb0 to 0xe0621ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500a040
INFO: task kworker/0:137:3761 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: da72c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:190:3763 blocked for more than 458 seconds.
task:kworker/1:190 state:D stack:0 pid:3763 tgid:3763 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0635d84 r8:00000002 r7:60000113 r6:e0635d8c r5:849b0000
r4:849b0000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b0000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91380
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0435000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bc9f8c r4:84bc9c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bc9f8c r4:8501c800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:8501c800 r8:8027ed34 r7:e0611e60 r6:85021b80 r5:849b0000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:138:3765 blocked for more than 458 seconds.
task:kworker/0:138 state:D stack:0 pid:3765 tgid:3765 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:849b0c00
r4:849b0c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b0c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500a580
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03b7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbff8c r4:84bbfc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbff8c r4:85021c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b0c00 r8:85021cac r7:82804d40 r6:dddced40 r5:dddced60
r4:85021c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021c80 r8:8027ed34 r7:e062de60 r6:85021d80 r5:849b0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0639fb0 to 0xe0639ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500a1c0
INFO: task kworker/0:138:3765 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: dabf0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:139:3767 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:139 state:D stack:0 pid:3767 tgid:3767 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e063dd84 r8:00000002 r7:60000113 r6:e063dd8c r5:849b1800
r4:849b1800
r5:849b1800 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500a400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00a9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bbfb8c r4:84bbf800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bbfb8c r4:85021d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b1800 r8:85021d2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85021d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021d00 r8:8027ed34 r7:e0639e60 r6:85021e80 r5:849b1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe063dfb0 to 0xe063dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500a3c0
INFO: task kworker/0:139:3767 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: daf68000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:140:3769 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:140 state:D stack:0 pid:3769 tgid:3769 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0641d84 r8:00000002 r7:60000013 r6:e0641d8c r5:849b2400
r4:849b2400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b2400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500a700
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03c7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bc838c r4:84bc8000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bc838c r4:85021e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b2400 r8:85021e2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85021e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021e00 r8:8027ed34 r7:e0639e60 r6:85021f80 r5:849b2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0641fb0 to 0xe0641ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500a4c0
INFO: task kworker/0:140:3769 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: db36e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:141:3771 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:141 state:D stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0645d84 r8:00000002 r7:60000113 r6:e0645d8c r5:849b3000
r4:849b3000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b3000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500aac0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03ed000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bc8b8c r4:84bc8800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bc8b8c r4:85021f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b3000 r8:85021f2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85021f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85021f00 r8:8027ed34 r7:e0641e60 r6:84a9bf00 r5:849b3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0645fb0 to 0xe0645ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500a640
INFO: task kworker/0:141:3771 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: db890000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:142:3772 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:142 state:D stack:0 pid:3772 tgid:3772 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e064dd84 r8:00000002 r7:60000013 r6:e064dd8c r5:849b3c00
r4:849b3c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b3c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500a880
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03dd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bc878c r4:84bc8400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bc878c r4:85000100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b3c00 r8:8500012c r7:82804d40 r6:dddced40 r5:dddced60
r4:85000100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85000100 r8:8027ed34 r7:e0645e60 r6:85000080 r5:849b3c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe064dfb0 to 0xe064dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500a840
INFO: task kworker/0:142:3772 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: db9b9000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:143:3776 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:143 state:D stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0649d84 r8:00000002 r7:60000013 r6:e0649d8c r5:849b4800
r4:849b4800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b4800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0453000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bca78c r4:84bca400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bca78c r4:85000000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b4800 r8:8500002c r7:82804d40 r6:dddced40 r5:dddced60
r4:85000000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85000000 r8:8027ed34 r7:e0645e60 r6:85000180 r5:849b4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0649fb0 to 0xe0649ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500aa00
INFO: task kworker/0:143:3776 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: dbc7b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:144:3777 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:144 state:D stack:0 pid:3777 tgid:3777 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0655d84 r8:00000002 r7:60000113 r6:e0655d8c r5:849b5400
r4:849b5400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b5400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500abc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03f9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bc8f8c r4:84bc8c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bc8f8c r4:85000200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b5400 r8:8500022c r7:82804d40 r6:dddced40 r5:dddced60
r4:85000200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85000200 r8:8027ed34 r7:e0649e60 r6:85000280 r5:849b5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0655fb0 to 0xe0655ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500ab00
INFO: task kworker/0:144:3777 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: dbf44000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:145:3778 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:145 state:D stack:0 pid:3778 tgid:3778 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:849b6000
r4:849b6000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b6000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500ae00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0405000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bc938c r4:84bc9000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bc938c r4:85000300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849b6000 r8:8500032c r7:82804d40 r6:dddced40 r5:dddced60
r4:85000300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85000300 r8:8027ed34 r7:e0649e60 r6:85000380 r5:849b6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0651fb0 to 0xe0651ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500ab00
INFO: task kworker/0:145:3778 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: dc12d000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:146:3781 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:146 state:D stack:0 pid:3781 tgid:3781 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e065dd84 r8:00000002 r7:60000113 r6:e065dd8c r5:84900000
r4:84900000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84900000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e065de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500af40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84900000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0417000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bc978c r4:84bc9400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bc978c r4:85000400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84900000 r8:8500042c r7:82804d40 r6:dddced40 r5:dddced60
r4:85000400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85000400 r8:8027ed34 r7:e0649e60 r6:85000480 r5:84900000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe065dfb0 to 0xe065dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500ae80
INFO: task kworker/0:146:3781 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: dc684000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:147:3782 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:147 state:D stack:0 pid:3782 tgid:3782 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0661d84 r8:00000002 r7:60000013 r6:e0661d8c r5:84900c00
r4:84900c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84900c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91200
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84900c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0423000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bc9b8c r4:84bc9800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bc9b8c r4:85000500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84900c00 r8:8500052c r7:82804d40 r6:dddced40 r5:dddced60
r4:85000500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85000500 r8:8027ed34 r7:e0649e60 r6:85000580 r5:84900c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0661fb0 to 0xe0661ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500ae80
INFO: task kworker/0:147:3782 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: dc93b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:148:3784 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:148 state:D stack:0 pid:3784 tgid:3784 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0659d84 r8:00000002 r7:60000113 r6:e0659d8c r5:84901800
r4:84901800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84901800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91680
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84901800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0441000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bca38c r4:84bca000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bca38c r4:85000600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84901800 r8:8500062c r7:82804d40 r6:dddced40 r5:dddced60
r4:85000600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85000600 r8:8027ed34 r7:e0649e60 r6:85000700 r5:84901800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0659fb0 to 0xe0659ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b91140
INFO: task kworker/0:148:3784 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: dca8e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:191:3786 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:191 state:D stack:0 pid:3786 tgid:3786 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e066dd84 r8:00000002 r7:60000013 r6:e066dd8c r5:84903000
r4:84903000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84903000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e066de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b586c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84903000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfca3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf038c r4:84bf0000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf038c r4:8501c880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84903000 r8:8501c8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c880 r8:8027ed34 r7:e0611e60 r6:85000680 r5:84903000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe066dfb0 to 0xe066dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501e600
INFO: task kworker/1:191:3786 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: dcd61000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:149:3789 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:149 state:D stack:0 pid:3789 tgid:3789 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0669d84 r8:00000002 r7:60000013 r6:e0669d8c r5:84903c00
r4:84903c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84903c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91880
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84903c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e045b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bcab8c r4:84bca800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bcab8c r4:85000800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:85000800 r8:8027ed34 r7:e0649e60 r6:85000880 r5:84903c00
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:192:3794 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:192 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0685d84 r8:00000002 r7:60000013 r6:e0685d8c r5:84906000
r4:84906000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84906000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b58000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84906000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbbf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bab38c r4:84bab000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bab38c r4:8501c780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84906000 r8:8501c7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c780 r8:8027ed34 r7:e066de60 r6:85000780 r5:84906000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0685fb0 to 0xe0685ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b58080
INFO: task kworker/1:192:3794 is blocked on a mutex likely owned by task kworker/1:75:3485.
Workqueue: events bpf_prog_free_deferred
1d20: dd342000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
r4:dff41dc0
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:150:3795 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:150 state:D stack:0 pid:3795 tgid:3795 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0689d84 r8:00000002 r7:60000113 r6:e0689d8c r5:84905400
r4:84905400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84905400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0689e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b99a40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84905400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffcb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bcb38c r4:84bcb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bcb38c r4:85000900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84905400 r8:8500092c r7:82804d40 r6:dddced40 r5:dddced60
r4:85000900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85000900 r8:8027ed34 r7:e0669e60 r6:85000980 r5:84905400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0689fb0 to 0xe0689ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b91900
INFO: task kworker/0:150:3795 is blocked on a mutex likely owned by task kworker/1:75:3485.
Call trace:
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:193:3796 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:193 state:D stack:0 pid:3796 tgid:3796 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e068dd84 r8:00000002 r7:60000013 r6:e068dd8c r5:84906c00
r4:84906c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84906c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b58200
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84906c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbf1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bab78c r4:84bab400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bab78c r4:8501c980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84906c00 r8:8501c9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501c980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501c980 r8:8027ed34 r7:e066de60 r6:85000a00 r5:84906c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe068dfb0 to 0xe068dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: dd8a9000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r5:84acaf8c r4:84acac00
r4:84b6f600
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:151:3797 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:151 state:D stack:0 pid:3797 tgid:3797 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0691d84 r8:00000002 r7:60000113 r6:e0691d8c r5:84902400
r4:84902400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84902400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b99040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84902400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfde9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bcaf8c r4:84bcac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bcaf8c r4:85000a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84902400 r8:85000aac r7:82804d40 r6:dddced40 r5:dddced60
r4:85000a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85000a80 r8:8027ed34 r7:e0689e60 r6:85000b00 r5:84902400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0691fb0 to 0xe0691ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b91900
INFO: task kworker/0:151:3797 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: ddd9f000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:194 state:D stack:0 pid:3799 tgid:3799 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fa0: 00000000 00000000 00000000 00000000
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:195:3802 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:195 state:D stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06a1d84 r8:00000002 r7:60000013 r6:e06a1d8c r5:84768000
r4:84768000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84768000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b584c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84768000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc6d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84babf8c r4:84babc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84babf8c r4:8501c900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:8501c900 r8:8027ed34 r7:e066de60 r6:85000c00 r5:84768000
r4:84b58500
Call trace:
1d60: 800d0013 ffffffff
r4:dff41dc0
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:196:3805 blocked for more than 458 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:196 state:D stack:0 pid:3805 tgid:3805 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06a5d84 r8:00000002 r7:60000113 r6:e06a5d8c r5:8476a400
r4:8476a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b587c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8476a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcd7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf078c r4:84bf0400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf078c r4:8501ca80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8476a400 r8:8501caac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501ca80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501ca80 r8:8027ed34 r7:e066de60 r6:85000c80 r5:8476a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06a5fb0 to 0xe06a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b58400
INFO: task kworker/1:196:3805 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: de58f000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:dff41dc0
r4:00000000
r5:00001000 r4:dfc9b000
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:197:3806 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:197 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06a9d84 r8:00000002 r7:60000013 r6:e06a9d8c r5:8476b000
r4:8476b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:dfd9b000
r10:61c88647 r9:8476b000 r8:8501cb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:198:3808 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:198 state:D stack:0 pid:3808 tgid:3808 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06add84 r8:00000002 r7:60000013 r6:e06add8c r5:8476bc00
r4:8476bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ade08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b58c40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8476bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe13000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf138c r4:84bf1000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf138c r4:8501cb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8476bc00 r8:8501cbac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501cb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501cb80 r8:8027ed34 r7:e06a9e60 r6:85000d80 r5:8476bc00
r4:00000001
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: deb09000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
r4:00000000
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:199:3810 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:199 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0671d84 r8:00000002 r7:60000013 r6:e0671d8c r5:8503c800
r4:8503c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8503c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r9:83018205 r8:8503c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdc7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf0f8c r4:84bf0c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf0f8c r4:8501cc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8503c800 r8:8501ccac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8501cc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501cc80 r8:8027ed34 r7:e06ade60 r6:8501cd00 r5:8503c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0671fb0 to 0xe0671ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b589c0
INFO: task kworker/1:199:3810 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:8503d400 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06bde08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:8501cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8501cc00 r8:8027ed34 r7:e06ade60 r6:8501ce00 r5:8503d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06bdfb0 to 0xe06bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b58b80
INFO: task kworker/1:200:3813 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: dec14000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:201 state:D stack:0 pid:3816 tgid:3816 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c1e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:dfe5f000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8501cd80 r8:8027ed34 r7:e06bde60 r6:8501ce80 r5:8503ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06c1fb0 to 0xe06c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8501efc0
INFO: task kworker/1:201:3816 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: df0a8000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:152:3817 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:152 state:D stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e069dd84 r8:00000002 r7:60000113 r6:e069dd8c r5:8476c800
r4:8476c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e069de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50cc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8476c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffbb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf838c r4:84bf8000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bf838c r4:85000e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8476c800 r8:85000e2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85000e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85000e00 r8:8027ed34 r7:e0689e60 r6:85000f00 r5:8476c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe069dfb0 to 0xe069dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b99080
INFO: task kworker/0:152:3817 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: df408000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:202:3818 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:202 state:D stack:0 pid:3818 tgid:3818 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06c5d84 r8:00000002 r7:60000013 r6:e06c5d8c r5:8476d400
r4:8476d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8476d400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe71000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf1f8c r4:84bf1c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf1f8c r4:8478f100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8476d400 r8:8478f12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f100 r8:8027ed34 r7:e06c1e60 r6:85000e80 r5:8476d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06c5fb0 to 0xe06c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b50080
INFO: task kworker/1:202:3818 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: df408000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:203:3821 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:203 state:D stack:0 pid:3821 tgid:3821 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06c9d84 r8:00000002 r7:60000113 r6:e06c9d8c r5:8476e000
r4:8476e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8476e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe99000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf238c r4:84bf2000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf238c r4:8478f000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8476e000 r8:8478f02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f000 r8:8027ed34 r7:e06c5e60 r6:85000f80 r5:8476e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06c9fb0 to 0xe06c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b502c0
INFO: task kworker/1:203:3821 is blocked on a mutex likely owned by task kworker/1:75:3485.
task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff41d20 to 0xdff41d68)
1d20: df766000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0
1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08
r4:dff41dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:204:3823 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:204 state:D stack:0 pid:3823 tgid:3823 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06cdd84 r8:00000002 r7:60000013 r6:e06cdd8c r5:8476ec00
r4:8476ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8476ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50480
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8476ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf278c r4:84bf2400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf278c r4:8478f180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8476ec00 r8:8478f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f180 r8:8027ed34 r7:e06c9e60 r6:84a9bf80 r5:8476ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06cdfb0 to 0xe06cdff8)
dfa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000000
r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acaf8c r4:84acac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff41fb0 to 0xdff41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b733c0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:205:3824 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:205 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06d1d84 r8:00000002 r7:60000113 r6:e06d1d8c r5:84769800
r4:84769800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84769800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b505c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84769800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff43000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf2b8c r4:84bf2800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf2b8c r4:8478f200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84769800 r8:8478f22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f200 r8:8027ed34 r7:e06cde60 r6:84b97000 r5:84769800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06d1fb0 to 0xe06d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b503c0
INFO: task kworker/1:205:3824 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 7f227000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 900d0013 ffffffff
r5:900d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:84904800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:8478f080 r8:8027ed34 r7:e06d1e60 r6:84b97080 r5:84904800
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b50500
INFO: task kworker/1:206:3826 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 7f4be000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 900d0013 ffffffff
r5:900d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:207:3829 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:207 state:D stack:0 pid:3829 tgid:3829 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06d9d84 r8:00000002 r7:60000113 r6:e06d9d8c r5:84778000
r4:84778000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84778000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50800
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84778000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff65000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf338c r4:84bf3000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf338c r4:8478f300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84778000 r8:8478f32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f300 r8:8027ed34 r7:e06d5e60 r6:84b97100 r5:84778000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06d9fb0 to 0xe06d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b50440
INFO: task kworker/1:207:3829 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 7f6cd000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 900d0013 ffffffff
r5:900d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:208:3831 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:208 state:D stack:0 pid:3831 tgid:3831 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06e1d84 r8:00000002 r7:60000013 r6:e06e1d8c r5:84778c00
r4:84778c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84778c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50980
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84778c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff75000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf378c r4:84bf3400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf378c r4:8478f280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84778c00 r8:8478f2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f280 r8:8027ed34 r7:e06d9e60 r6:84b97180 r5:84778c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06e1fb0 to 0xe06e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b50740
INFO: task kworker/1:208:3831 is blocked on a mutex likely owned by task kworker/1:79:3493.
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 7f78b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 900d0013 ffffffff
r5:900d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:84779800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50a40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84779800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff91000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf3b8c r4:84bf3800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf3b8c r4:8478f400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84779800 r8:8478f42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f400 r8:8027ed34 r7:e06e1e60 r6:84b97200 r5:84779800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06e5fb0 to 0xe06e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b508c0
INFO: task kworker/1:209:3832 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r5:84acb38c r4:84acb000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:210:3834 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:210 state:D stack:0 pid:3834 tgid:3834 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e06e9d84 r8:00000002 r7:60000013 r6:e06e9d8c r5:8477a400
r4:8477a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8477a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50f80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8477a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffdd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf878c r4:84bf8400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf878c r4:8478f380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8477a400 r8:8478f3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f380 r8:8027ed34 r7:e06e5e60 r6:84b97280 r5:8477a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06e9fb0 to 0xe06e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b50940
INFO: task kworker/1:210:3834 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 7fcc1000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 900d0013 ffffffff
r5:900d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:211:3836 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:211 state:D stack:0 pid:3836 tgid:3836 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0705d84 r8:00000002 r7:60000013 r6:e0705d8c r5:8477b000
r4:8477b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8477b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0705e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50c00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8477b000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffa5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf3f8c r4:84bf3c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf3f8c r4:8478f500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8477b000 r8:8478f52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f500 r8:8027ed34 r7:e06e9e60 r6:84b97300 r5:8477b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0705fb0 to 0xe0705ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b50b40
INFO: task kworker/1:211:3836 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 80212000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:153 state:D stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b99d00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8477bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e053f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bcbb8c r4:84bcb800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bcbb8c r4:84b97380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8477bc00 r8:84b973ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b97380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b97380 r8:8027ed34 r7:e0689e60 r6:84b97400 r5:8477bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06b1fb0 to 0xe06b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b99880
INFO: task kworker/0:153:3838 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 804b9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:829185c4 r9:e070dd84 r8:00000002 r7:60000113 r6:e070dd8c r5:8477c800
r4:8477c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8477c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b99ec0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8477c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e052f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bcb78c r4:84bcb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84bcb78c r4:84b97480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8477c800 r8:84b974ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b97480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b97480 r8:8027ed34 r7:e06b1e60 r6:84b97580 r5:8477c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe070dfb0 to 0xe070dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b99980
INFO: task kworker/0:154:3840 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 80796000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:8477e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8477e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0719e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b58fc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8477e000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfff7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf8b8c r4:84bf8800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf8b8c r4:8478f580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8477e000 r8:8478f5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f580 r8:8027ed34 r7:e06e9e60 r6:84b97500 r5:8477e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0719fb0 to 0xe0719ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b58f40
INFO: task kworker/1:212:3842 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 80a6f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:213 state:D stack:0 pid:3844 tgid:3844 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0711d84 r8:00000002 r7:60000113 r6:e0711d8c r5:8503e000
r4:8503e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8503e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8503e000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0473000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf8f8c r4:84bf8c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf8f8c r4:8478f600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8503e000 r8:8478f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f600 r8:8027ed34 r7:e0719e60 r6:8478f680 r5:8503e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0711fb0 to 0xe0711ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b50fc0
INFO: task kworker/1:213:3844 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:214:3847 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:214 state:D stack:0 pid:3847 tgid:3847 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0731d84 r8:00000002 r7:60000013 r6:e0731d8c r5:8503b000
r4:8503b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8503b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0731e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8503b000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0491000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf978c r4:84bf9400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf978c r4:8478f480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8503b000 r8:8478f4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f480 r8:8027ed34 r7:e0711e60 r6:8478f780 r5:8503b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0731fb0 to 0xe0731ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b95080
INFO: task kworker/1:214:3847 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 80e4d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:215:3848 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:215 state:D stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0715d84 r8:00000002 r7:60000013 r6:e0715d8c r5:8503bc00
r4:8503bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8503bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0715e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8503bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e047f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf938c r4:84bf9000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf938c r4:8478f700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8503bc00 r8:8478f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f700 r8:8027ed34 r7:e0731e60 r6:8478f880 r5:8503bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0715fb0 to 0xe0715ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b95080
INFO: task kworker/1:215:3848 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
Exception stack(0xdff61d20 to 0xdff61d68)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:216:3850 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:216 state:D stack:0 pid:3850 tgid:3850 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:8503a400
r4:8503a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8503a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8503a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04c3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf9f8c r4:84bf9c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf9f8c r4:8478f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8503a400 r8:8478f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f800 r8:8027ed34 r7:e0731e60 r6:8478f900 r5:8503a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0739fb0 to 0xe0739ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b951c0
INFO: task kworker/1:216:3850 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:82abe1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:217:3851 blocked for more than 459 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:217 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e073dd84 r8:00000002 r7:60000113 r6:e073dd8c r5:85038000
r4:85038000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85038000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e073de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95580
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85038000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04b1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bf9b8c r4:84bf9800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bf9b8c r4:8478f980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85038000 r8:8478f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478f980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478f980 r8:8027ed34 r7:e0739e60 r6:8478fa80 r5:85038000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d60: 800d0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r5:84acb38c r4:84acb000
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
r4:84b73ac0
task:kworker/1:218 state:D stack:0 pid:3853 tgid:3853 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0741d84 r8:00000002 r7:60000013 r6:e0741d8c r5:85039800
r4:85039800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85039800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0741e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b92880
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85039800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0679000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bfbb8c r4:84bfb800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bfbb8c r4:8478fa00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85039800 r8:8478fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478fa00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478fa00 r8:8027ed34 r7:e0739e60 r6:8478fb80 r5:85039800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0741fb0 to 0xe0741ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b956c0
INFO: task kworker/1:218:3853 is blocked on a mutex likely owned by task kworker/1:79:3493.
Workqueue: events bpf_prog_free_deferred
1d20: 81d79000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:219:3856 blocked for more than 460 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:219 state:D stack:0 pid:3856 tgid:3856 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0735d84 r8:00000002 r7:60000013 r6:e0735d8c r5:849b6c00
r4:849b6c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849b6c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95940
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04d3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 81f4d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0: 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0749e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:e04e9000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85040000 r8:8478fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478fc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478fc00 r8:8027ed34 r7:e0741e60 r6:8478fd80 r5:85040000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0749fb0 to 0xe0749ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b959c0
INFO: task kworker/1:220:3858 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 832af000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e074de08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xe074dfb0 to 0xe074dff8)
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
1d20: 838f9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:82abe1e4
r4:dff61dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:222:3862 blocked for more than 460 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:222 state:D stack:0 pid:3862 tgid:3862 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0755d84 r8:00000002 r7:60000113 r6:e0755d8c r5:85040c00
r4:85040c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85040c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b92300
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85040c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0567000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bfaf8c r4:84bfac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bfaf8c r4:8478fe00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85040c00 r8:8478fe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8478fe00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8478fe00 r8:8027ed34 r7:e0741e60 r6:8478ff00 r5:85040c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0755fb0 to 0xe0755ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b95ac0
INFO: task kworker/1:222:3862 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 83ed7000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:84b6f800
r4:84b73ac0
r5:85043c00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e075de08
r5:84bcbf8c r4:84bcbc00
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000001
r4:84b73ac0
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0765e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841b9dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85044800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc07000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be2b8c r4:84be2800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be2b8c r4:84b97680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85044800 r8:84b976ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b97680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b97680 r8:8027ed34 r7:e075de60 r6:8501cf80 r5:85044800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0765fb0 to 0xe0765ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85003080
INFO: task kworker/0:156:3865 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 846bd000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
INFO: task kworker/0:157:3866 blocked for more than 460 seconds.
task:kworker/0:157 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003300
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85045400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e058f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be038c r4:84be0000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be038c r4:84b97780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85045400 r8:84b977ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b97780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b97780 r8:8027ed34 r7:e0765e60 r6:8501cf00 r5:85045400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0769fb0 to 0xe0769ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85003080
INFO: task kworker/0:157:3866 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 84a86000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0761e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:e0575000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0: 00000000 00000000 00000000 00000000
r4:84b92240
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8514b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:224:3871 blocked for more than 460 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:224 state:D stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:8498a400
r4:8498a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8498a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b92780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8498a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05f3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bfb78c r4:84bfb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bfb78c r4:84b59080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8498a400 r8:84b590ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59080 r8:8027ed34 r7:e0741e60 r6:84b97700 r5:8498a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0751fb0 to 0xe0751ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b92240
INFO: task kworker/1:224:3871 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 85605000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:158:3873 blocked for more than 460 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:158 state:D stack:0 pid:3873 tgid:3873 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0745d84 r8:00000002 r7:60000113 r6:e0745d8c r5:8498b000
r4:8498b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8498b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0745e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8498b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0599000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be078c r4:84be0400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be078c r4:84b97800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8498b000 r8:84b9782c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b97800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b97800 r8:8027ed34 r7:e0765e60 r6:84b97880 r5:8498b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0745fb0 to 0xe0745ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850033c0
INFO: task kworker/0:158:3873 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 85a8f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:225:3877 blocked for more than 460 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:225 state:D stack:0 pid:3877 tgid:3877 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r4:8498d400
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0775e08
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:8498d400 r8:84b5922c r7:82804d40 r6:ddde2d40 r5:ddde2d60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:226:3878 blocked for more than 460 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:226 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e0779d84 r8:00000002 r7:60000113 r6:e0779d8c r5:8498e000
r4:8498e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8498e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0779e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b929c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8498e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9ef000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84bfbf8c r4:84bfbc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84bfbf8c r4:84b59180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8498e000 r8:84b591ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59180 r8:8027ed34 r7:e0775e60 r6:84b97980 r5:8498e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0779fb0 to 0xe0779ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b927c0
INFO: task kworker/1:226:3878 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:227:3882 blocked for more than 460 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:227 state:D stack:0 pid:3882 tgid:3882 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47add84 r8:00000002 r7:60000113 r6:e47add8c r5:8498bc00
r4:8498bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8498bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47ade08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b92b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8498bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa4f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8438c r4:84b84000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8438c r4:84b59280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8498bc00 r8:84b592ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59280 r8:8027ed34 r7:e0775e60 r6:84b97a00 r5:8498bc00
r4:00000001
dfa0: 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 865d6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/1:228:3883 blocked for more than 460 seconds.
Workqueue: events bpf_prog_free_deferred
r5:84989800 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47b1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b92c40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84989800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa95000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8478c r4:84b84400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8478c r4:84b59300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84989800 r8:84b5932c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59300 r8:8027ed34 r7:e0775e60 r6:84b97b00 r5:84989800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47b1fb0 to 0xe47b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b92a40
INFO: task kworker/1:228:3883 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 86d0e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:229:3885 blocked for more than 460 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:229 state:D stack:0 pid:3885 tgid:3885 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47b9d84 r8:00000002 r7:60000113 r6:e47b9d8c r5:8498c800
r4:8498c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8498c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47b9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b92d40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8498c800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfacf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b84b8c r4:84b84800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b84b8c r4:84b59400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8498c800 r8:84b5942c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59400 r8:8027ed34 r7:e0775e60 r6:84b97a80 r5:8498c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47b9fb0 to 0xe47b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 86e29000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:230:3887 blocked for more than 460 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:230 state:D stack:0 pid:3887 tgid:3887 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47c1d84 r8:00000002 r7:60000013 r6:e47c1d8c r5:84988000
r4:84988000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84988000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47c1e08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r9:83018205 r8:84988000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84988000 r8:84b593ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59380 r8:8027ed34 r7:e0775e60 r6:84b97b80 r5:84988000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47c1fb0 to 0xe47c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b92e40
INFO: task kworker/1:230:3887 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 870f7000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r5:84acb38c r4:84acb000
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47c9e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850110c0
r10:61c88647 r9:8498ec00 r8:84b5952c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b92d00
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 87a11000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:159:3891 blocked for more than 460 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:159 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47d9d84 r8:00000002 r7:60000113 r6:e47d9d8c r5:8477ec00
r4:8477ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8477ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47d9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85003d40
INFO: task kworker/0:159:3891 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 87a11000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84b73ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:85046c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0771e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95fc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85046c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd51000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8578c r4:84b85400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8578c r4:84b59580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85046c00 r8:84b595ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59580 r8:8027ed34 r7:e47c9e60 r6:84b59600 r5:85046c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0771fb0 to 0xe0771ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b95300
INFO: task kworker/1:232:3892 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 88284000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:00000000
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:84b73ac0
task:kworker/1:233 state:D stack:0 pid:3894 tgid:3894 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47cdd84 r8:00000002 r7:60000113 r6:e47cdd8c r5:85046000
r4:85046000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85046000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47cde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850115c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85046000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0065000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8678c r4:84b86400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8678c r4:84b59480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85046000 r8:84b594ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59480 r8:8027ed34 r7:e47c9e60 r6:84b97d80 r5:85046000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47cdfb0 to 0xe47cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: 886fe000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:234:3896 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:234 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47e5d84 r8:00000002 r7:60000013 r6:e47e5d8c r5:8477d400
r4:8477d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8477d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85011300
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8477d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e001f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d40 r6:83018200 r5:84b85f8c r4:84b59700
Exception stack(0xe47e5fb0 to 0xe47e5ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85011000
INFO: task kworker/1:234:3896 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 88b53000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:160:3898 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:160 state:D stack:0 pid:3898 tgid:3898 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47e1d84 r8:00000002 r7:60000113 r6:e47e1d8c r5:84988c00
r4:84988c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e1e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r7:dddced40 r6:83018000 r5:84be138c r4:84b97e80
1fa0: 00000000 00000000 00000000 00000000
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fa0: 00000000 00000000 00000000 00000000
r4:84b73ac0
INFO: task kworker/1:235:3901 blocked for more than 461 seconds.
task:kworker/1:235 state:D stack:0 pid:3901 tgid:3901 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:84758000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85011400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84758000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e002f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8638c r4:84b86000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8638c r4:84b59680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84758000 r8:84b596ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59680 r8:8027ed34 r7:e47cde60 r6:84b97f00 r5:84758000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47e9fb0 to 0xe47e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85011440
INFO: task kworker/1:235:3901 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 897d9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fa0: 00000000 00000000 00000000 00000000
r4:84b73ac0
INFO: task kworker/1:236:3903 blocked for more than 461 seconds.
task:kworker/1:236 state:D stack:0 pid:3903 tgid:3903 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:84758c00
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47ede08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85011700
r5:00001000 r4:e009b000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84758c00 r8:84b597ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xe47edfb0 to 0xe47edff8)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85011500
INFO: task kworker/1:236:3903 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 897d9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:237:3905 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:237 state:D stack:0 pid:3905 tgid:3905 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47f1d84 r8:00000002 r7:60000013 r6:e47f1d8c r5:84759800
r4:84759800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84759800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47f1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r4:00000001
r4:84b73ac0
task:kworker/1:238 state:D stack:0 pid:3907 tgid:3907 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85011800
r5:00001000 r4:e03b0000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:8475b000 r8:84b5992c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85011740
INFO: task kworker/1:238:3907 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 89bc3000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:239:3908 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:239 state:D stack:0 pid:3908 tgid:3908 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47fdd84 r8:00000002 r7:60000113 r6:e47fdd8c r5:8475bc00
r4:8475bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47fde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850118c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03bd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8738c r4:84b87000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8738c r4:84b59980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475bc00 r8:84b599ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59980
r10:00000000 r9:84b59980 r8:8027ed34 r7:e47f1e60 r6:85012180 r5:8475bc00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xdff61d20 to 0xdff61d68)
r4:00000000
r5:84acb38c r4:84acb000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:240:3911 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:240 state:D stack:0 pid:3911 tgid:3911 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e880dd84 r8:00000002 r7:60000013 r6:e880dd8c r5:8475c800
r4:8475c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e880de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8c340
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475c800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0609000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8938c r4:84b89000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8938c r4:84b59800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475c800 r8:84b5982c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59800 r8:8027ed34 r7:e47f1e60 r6:85012200 r5:8475c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe880dfb0 to 0xe880dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85011880
INFO: task kworker/1:240:3911 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8a371000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:241:3912 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:241 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8811d84 r8:00000002 r7:60000113 r6:e8811d8c r5:8475a400
r4:8475a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8811e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85011b80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03f5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b87b8c r4:84b87800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b87b8c r4:84b59a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475a400 r8:84b59a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59a00 r8:8027ed34 r7:e880de60 r6:85012280 r5:8475a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8811fb0 to 0xe8811ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85011880
INFO: task kworker/1:241:3912 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8a744000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:84acb38c r4:84acb000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:242:3914 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:242 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8819d84 r8:00000002 r7:60000013 r6:e8819d8c r5:8475d400
r4:8475d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8819e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85011d00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e040d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b87f8c r4:84b87c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b87f8c r4:84b59a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475d400 r8:84b59aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59a80 r8:8027ed34 r7:e880de60 r6:85012300 r5:8475d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8819fb0 to 0xe8819ff8)
9fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:243:3916 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:243 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8821d84 r8:00000002 r7:60000013 r6:e8821d8c r5:8475e000
r4:8475e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8475e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8821e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85011e40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8475e000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0421000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8838c r4:84b88000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8838c r4:84b59b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8475e000 r8:84b59bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59b80 r8:8027ed34 r7:e880de60 r6:85012380 r5:8475e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8821fb0 to 0xe8821ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85011c40
INFO: task kworker/1:243:3916 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8af3f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:84acb38c r4:84acb000
r4:84b6f800
r4:00000001
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:244:3918 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:244 state:D stack:0 pid:3918 tgid:3918 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8829d84 r8:00000002 r7:60000013 r6:e8829d8c r5:849c8c00
r4:849c8c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849c8c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8829e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85011f00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0437000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8878c r4:84b88400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8878c r4:84b59c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849c8c00 r8:84b59c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59c00 r8:8027ed34 r7:e880de60 r6:85012400 r5:849c8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8829fb0 to 0xe8829ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85011ec0
INFO: task kworker/1:244:3918 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8b625000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:245:3920 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:245 state:D stack:0 pid:3920 tgid:3920 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8831d84 r8:00000002 r7:60000113 r6:e8831d8c r5:849ca400
r4:849ca400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849ca400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8831e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8c000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e044b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b88b8c r4:84b88800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b88b8c r4:84b59b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849ca400 r8:84b59b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59b00 r8:8027ed34 r7:e880de60 r6:85012480 r5:849ca400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8831fb0 to 0xe8831ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85011e00
INFO: task kworker/1:245:3920 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8b7fd000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:246:3922 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:246 state:D stack:0 pid:3922 tgid:3922 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8839d84 r8:00000002 r7:60000013 r6:e8839d8c r5:849c9800
r5:849c9800 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8839e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8c200
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0463000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b88f8c r4:84b88c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b88f8c r4:84b59c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849c9800 r8:84b59cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59c80 r8:8027ed34 r7:e880de60 r6:85012500 r5:849c9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8839fb0 to 0xe8839ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8c080
INFO: task kworker/1:246:3922 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8bea9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:247:3925 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:247 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:829185c4 r9:e8841d84 r8:00000002 r7:60000113 r6:e8841d8c r5:849c8000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8841e08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8c980
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8859000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b89f8c r4:84b89c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b89f8c r4:84b59d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849c8000 r8:84b59dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59d80 r8:8027ed34 r7:e880de60 r6:85012580 r5:849c8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8841fb0 to 0xe8841ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8c280
INFO: task kworker/1:247:3925 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8bf95000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:248:3926 blocked for more than 461 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8835d84 r8:00000002 r7:60000013 r6:e8835d8c r5:85038c00
r4:85038c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85038c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8835e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8c5c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85038c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0721000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8978c r4:84b89400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8978c r4:84b59d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85038c00 r8:84b59d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59d00 r8:8027ed34 r7:e8841e60 r6:84b59e00 r5:85038c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8835fb0 to 0xe8835ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8c280
INFO: task kworker/1:248:3926 is blocked on a mutex likely owned by task kworker/1:79:3493.
Workqueue: events bpf_prog_free_deferred
1d20: 8c0f0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:161:3928 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:161 state:D stack:0 pid:3928 tgid:3928 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e076dd84 r8:00000002 r7:60000113 r6:e076dd8c r5:849cbc00
r4:849cbc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849cbc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500fd40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e4781000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be178c r4:84be1400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be178c r4:85012600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849cbc00 r8:8501262c r7:82804d40 r6:dddced40 r5:dddced60
r4:85012600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85012600 r8:8027ed34 r7:e0765e60 r6:85012700 r5:849cbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe076dfb0 to 0xe076dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500fe80
INFO: task kworker/0:161:3928 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8c3d9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:249:3930 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:249 state:D stack:0 pid:3930 tgid:3930 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e47f5d84 r8:00000002 r7:60000013 r6:e47f5d8c r5:84b4b000
r4:84b4b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84b4b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47f5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8c880
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84b4b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8853000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b89b8c r4:84b89800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b89b8c r4:84b59e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84b4b000 r8:84b59eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b59e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b59e80 r8:8027ed34 r7:e8841e60 r6:84b59f80 r5:84b4b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe47f5fb0 to 0xe47f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8c280
INFO: task kworker/1:249:3930 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d20: 8c620000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:162 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8849e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500f6c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8801000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be1b8c r4:84be1800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be1b8c r4:85012680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849cc800 r8:850126ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85012680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85012680 r8:8027ed34 r7:e0765e60 r6:85012800 r5:849cc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8849fb0 to 0xe8849ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500fc80
INFO: task kworker/0:162:3932 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8cbad000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:250:3937 blocked for more than 461 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:250 state:D stack:0 pid:3937 tgid:3937 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8851d84 r8:00000002 r7:60000113 r6:e8851d8c r5:85048c00
r4:85048c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85048c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8851e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8cc00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85048c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8865000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8a78c r4:84b8a400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8a78c r4:85023100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85048c00 r8:8502312c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023100 r8:8027ed34 r7:e8841e60 r6:85023080 r5:85048c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8851fb0 to 0xe8851ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8c8c0
INFO: task kworker/1:250:3937 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8ce6c000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/1:251:3938 blocked for more than 461 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8869d84 r8:00000002 r7:60000113 r6:e8869d8c r5:85049800
r4:85049800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85049800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8869e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8ca80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85049800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e885f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8a38c r4:84b8a000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8a38c r4:85023000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85049800 r8:8502302c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023000 r8:8027ed34 r7:e8851e60 r6:85023200 r5:85049800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8869fb0 to 0xe8869ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8cbc0
INFO: task kworker/1:251:3938 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8d213000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e8845d84 r8:00000002 r7:60000013 r6:e8845d8c r5:8504a400
r4:8504a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8504a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8845e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8cdc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8504a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8873000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8ab8c r4:84b8a800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8ab8c r4:85023180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8504a400 r8:850231ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023180 r8:8027ed34 r7:e8851e60 r6:85023280 r5:8504a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8845fb0 to 0xe8845ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8cb40
INFO: task kworker/1:252:3940 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000000
r5:00001000 r4:dfcaf000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8871e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8cf80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8504b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8879000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8af8c r4:84b8ac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8af8c r4:85023300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8504b000 r8:8502332c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023300 r8:8027ed34 r7:e8845e60 r6:85023400 r5:8504b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8871fb0 to 0xe8871ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8cd00
INFO: task kworker/1:253:3942 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8dd44000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:254:3944 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:254 state:D stack:0 pid:3944 tgid:3944 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea889e08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:85023380
r10:00000000 r9:85023380 r8:8027ed34 r7:e8871e60 r6:85023500 r5:8504c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea889fb0 to 0xea889ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8cec0
INFO: task kworker/1:254:3944 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8dd44000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/0:163:3945 blocked for more than 462 seconds.
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea88de08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea95f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be1f8c r4:84be1c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be1f8c r4:85012780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849cec00 r8:850127ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85012780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85012780 r8:8027ed34 r7:e0765e60 r6:85012900 r5:849cec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea88dfb0 to 0xea88dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8500f380
INFO: task kworker/0:163:3945 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8e12b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84b6f800
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:255 state:D stack:0 pid:3947 tgid:3947 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea899e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7c000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea88f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8b38c r4:84b8b000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8b38c r4:85023480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849ce000 r8:850234ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023480 r8:8027ed34 r7:ea889e60 r6:85012880 r5:849ce000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea899fb0 to 0xea899ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7c100
INFO: task kworker/1:255:3947 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d60: 800d0013 ffffffff
r4:dff61dc0
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:256:3949 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:256 state:D stack:0 pid:3949 tgid:3949 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8a5d84 r8:00000002 r7:60000113 r6:ea8a5d8c r5:849cd400
r4:849cd400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849cd400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7c280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea895000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8b78c r4:84b8b400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8b78c r4:85023600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849cd400 r8:8502362c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023600 r8:8027ed34 r7:ea889e60 r6:85012980 r5:849cd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8a5fb0 to 0xea8a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7c1c0
INFO: task kworker/1:256:3949 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
1d60: 800d0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:257:3951 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:257 state:D stack:0 pid:3951 tgid:3951 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8b5d84 r8:00000002 r7:60000113 r6:ea8b5d8c r5:8475ec00
r4:8475ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b5e08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:85023680 r8:8027ed34 r7:ea889e60 r6:85012a00 r5:8475ec00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:258:3953 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:258 state:D stack:0 pid:3953 tgid:3953 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8c1d84 r8:00000002 r7:60000113 r6:ea8c1d8c r5:84808c00
r4:84808c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84808c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8c1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7c4c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84808c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8ad000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84b8bf8c r4:84b8bc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84b8bf8c r4:85023700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:85023700 r8:8027ed34 r7:ea889e60 r6:85012a80 r5:84808c00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 8f438000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:259:3955 blocked for more than 462 seconds.
r10:829185c4 r9:ea8d1d84 r8:00000002 r7:60000013 r6:ea8d1d8c r5:8480a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8480a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7cf00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8480a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea921000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850b9f8c r4:850b9c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850b9f8c r4:85023780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8480a400 r8:850237ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023780 r8:8027ed34 r7:ea889e60 r6:85012b00 r5:8480a400
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:800d0013 r4:80239bd0
r4:00000000
r5:00001000 r4:dfcaf000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8d9d84 r8:00000002 r7:60000113 r6:ea8d9d8c r5:8480b000
r4:8480b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8480b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7c780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8480b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8c9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850b878c r4:850b8400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850b878c r4:85023800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8480b000 r8:8502382c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023800 r8:8027ed34 r7:ea8d1e60 r6:85012b80 r5:8480b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8d9fb0 to 0xea8d9ff8)
9fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:dff61dc0
r4:00000000
r5:00001000 r4:dfcaf000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:261 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8e1d84 r8:00000002 r7:60000013 r6:ea8e1d8c r5:8480bc00
r4:8480bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8480bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7c8c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8480bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8e3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850b8b8c r4:850b8800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850b8b8c r4:85023900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8480bc00 r8:8502392c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023900 r8:8027ed34 r7:ea8d1e60 r6:85012c00 r5:8480bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8e1fb0 to 0xea8e1ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:82abe1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:262:3960 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:262 state:D stack:0 pid:3960 tgid:3960 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8f5d84 r8:00000002 r7:60000013 r6:ea8f5d8c r5:84808000
r4:84808000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84808000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7ca00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84808000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8e9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850b8f8c r4:850b8c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850b8f8c r4:85023880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84808000 r8:850238ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023880 r8:8027ed34 r7:ea8d1e60 r6:85012c80 r5:84808000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8f5fb0 to 0xea8f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace:
1d60: 800d0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:263:3962 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:263 state:D stack:0 pid:3962 tgid:3962 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8fdd84 r8:00000002 r7:60000113 r6:ea8fdd8c r5:84809800
r4:84809800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84809800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8fde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7cb40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84809800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8ff000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850b938c r4:850b9000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850b938c r4:85023580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84809800 r8:850235ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023580 r8:8027ed34 r7:ea8d1e60 r6:85012d00 r5:84809800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8fdfb0 to 0xea8fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7c940
INFO: task kworker/1:263:3962 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 908fb000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:264:3965 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:264 state:D stack:0 pid:3965 tgid:3965 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea915d84 r8:00000002 r7:60000113 r6:ea915d8c r5:8480c800
r4:8480c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8480c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea915e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7cc40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8480c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea905000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850b978c r4:850b9400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850b978c r4:85023980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8480c800 r8:850239ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023980 r8:8027ed34 r7:ea8d1e60 r6:85012d80 r5:8480c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: 90d60000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:265 state:D stack:0 pid:3966 tgid:3966 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea919d84 r8:00000002 r7:60000113 r6:ea919d8c r5:8480d400
r4:8480d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8480d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea919e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7ce00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8480d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea91b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850b9b8c r4:850b9800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850b9b8c r4:85023a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8480d400 r8:85023a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023a00 r8:8027ed34 r7:ea8d1e60 r6:85012e00 r5:8480d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea919fb0 to 0xea919ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7cc00
INFO: task kworker/1:265:3966 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r5:800d0013 r4:80239bd0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:266:3969 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:266 state:D stack:0 pid:3969 tgid:3969 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea939d84 r8:00000002 r7:60000013 r6:ea939d8c r5:8480e000
r4:8480e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8480e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea939e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b57040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8480e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea93d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ba78c r4:850ba400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850ba78c r4:85023a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8480e000 r8:85023aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023a80 r8:8027ed34 r7:ea8d1e60 r6:85012e80 r5:8480e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea939fb0 to 0xea939ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a7ce40
INFO: task kworker/1:266:3969 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:267:3970 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:267 state:D stack:0 pid:3970 tgid:3970 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea911d84 r8:00000002 r7:60000113 r6:ea911d8c r5:8504e000
r4:8504e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8504e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea911e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85011e00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8504e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea92b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ba38c r4:850ba000
r7:ddde2d40 r6:83018200 r5:850ba38c r4:85023b00
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:84a7ce40
INFO: task kworker/1:267:3970 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 91895000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:268:3973 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:ea94d000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fa0: 00000000 00000000 00000000 00000000
r4:84b57180
INFO: task kworker/1:268:3973 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 91c53000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:269:3975 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:269 state:D stack:0 pid:3975 tgid:3975 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea945d84 r8:00000002 r7:60000013 r6:ea945d8c r5:8504ec00
r4:8504ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8504ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b571c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8504ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea947000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:85023d00
r10:00000000 r9:85023d00 r8:8027ed34 r7:ea885e60 r6:85023d80 r5:8504ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea945fb0 to 0xea945ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b57100
INFO: task kworker/1:269:3975 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 926e9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d60: 800d0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:270 state:D stack:0 pid:3976 tgid:3976 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8b1d84 r8:00000002 r7:60000113 r6:ea8b1d8c r5:85048000
r4:85048000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85048000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b57700
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85048000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea965000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850bb38c r4:850bb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850bb38c r4:85023e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85048000 r8:85023eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85023e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85023e80 r8:8027ed34 r7:ea885e60 r6:85023e00 r5:85048000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8b1fb0 to 0xea8b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b57300
INFO: task kworker/1:270:3976 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 92c0d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:164:3979 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:164 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea951d84 r8:00000002 r7:60000113 r6:ea951d8c r5:849cb000
r4:849cb000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:849cb000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472aac0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:849cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfba9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be278c r4:84be2400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be278c r4:84aa0100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849cb000 r8:84aa012c r7:82804d40 r6:dddced40 r5:dddced60
r4:84aa0100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa0100 r8:8027ed34 r7:e0765e60 r6:84aa0000 r5:849cb000
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:841b9e00
Workqueue: events bpf_prog_free_deferred
1d20: 92f9e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:271:3980 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:271 state:D stack:0 pid:3980 tgid:3980 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea96dd84 r8:00000002 r7:60000113 r6:ea96dd8c r5:8480ec00
r4:8480ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8480ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea96de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
dfa0: 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 93260000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:272:3982 blocked for more than 462 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:272 state:D stack:0 pid:3982 tgid:3982 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea981e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b57780
r9:83018205 r8:84980c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea977000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850bb78c r4:850bb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850bb78c r4:84a83100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84980c00 r8:84a8312c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a83100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a83100 r8:8027ed34 r7:ea96de60 r6:84aa0180 r5:84980c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea981fb0 to 0xea981ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b576c0
INFO: task kworker/1:272:3982 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9399c000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:165:3987 blocked for more than 462 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471d0c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84982400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc59000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be2f8c r4:84be2c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be2f8c r4:84aa0200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84982400 r8:84aa022c r7:82804d40 r6:dddced40 r5:dddced60
r4:84aa0200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa0200 r8:8027ed34 r7:e0765e60 r6:84aa0300 r5:84982400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea969fb0 to 0xea969ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:841b9240
INFO: task kworker/0:165:3987 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:00000000
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:84983000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84983000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcb9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be338c r4:84be3000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be338c r4:84aa0280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84983000 r8:84aa02ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84aa0280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa0280 r8:8027ed34 r7:ea969e60 r6:84aa0400 r5:84983000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea985fb0 to 0xea985ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8471d000
INFO: task kworker/0:166:3989 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 93f7f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84b6f800
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:84b73ac0
task:kworker/0:167 state:D stack:0 pid:3991 tgid:3991 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea989e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471d6c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84983c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdff000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be3f8c r4:84be3c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be3f8c r4:84aa0380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84983c00 r8:84aa03ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84aa0380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa0380 r8:8027ed34 r7:ea985e60 r6:84aa0500 r5:84983c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea989fb0 to 0xea989ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8471d180
INFO: task kworker/0:167:3991 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 947f5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/0:168:3993 blocked for more than 463 seconds.
r10:829185c4 r9:ea98dd84 r8:00000002 r7:60000113 r6:ea98dd8c r5:84984800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471d3c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84984800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd1d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84be378c r4:84be3400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:84be378c r4:84aa0480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84984800 r8:84aa04ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84aa0480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa0480 r8:8027ed34 r7:ea989e60 r6:84aa0600 r5:84984800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea98dfb0 to 0xea98dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 800d0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:273:3994 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:273 state:D stack:0 pid:3994 tgid:3994 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea975d84 r8:00000002 r7:60000113 r6:ea975d8c r5:84985400
r4:84985400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84985400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea975e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85014000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84985400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0475000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850bbb8c r4:850bb800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850bbb8c r4:84a83080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84985400 r8:84a830ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a83080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a83080 r8:8027ed34 r7:ea96de60 r6:84aa0580 r5:84985400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea975fb0 to 0xea975ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b57bc0
INFO: task kworker/1:273:3994 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
1d20: 94cfa000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:169:3996 blocked for more than 463 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:84986000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:dfdd3000
r7:dddced40 r6:83018000 r5:84be3b8c r4:84aa0680
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9503f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:170:3999 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:170 state:D stack:0 pid:3999 tgid:3999 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r5:84986c00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:dfe3f000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84aa0780 r8:8027ed34 r7:ea989e60 r6:84aa0880 r5:84986c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea995fb0 to 0xea995ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8471d600
INFO: task kworker/0:170:3999 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9503f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:171:4000 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:171 state:D stack:0 pid:4000 tgid:4000 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea999d84 r8:00000002 r7:60000113 r6:ea999d8c r5:84981800
r4:84981800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84981800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84aa0800 r8:8027ed34 r7:ea995e60 r6:84aa0900 r5:84981800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
1d20: 9580a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:172:4002 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
task:kworker/0:172 state:D stack:0 pid:4002 tgid:4002 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea99de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471db40
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84980000 r8:84aa0a2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84aa0a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa0a00 r8:8027ed34 r7:ea999e60 r6:84aa0a80 r5:84980000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea99dfb0 to 0xea99dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8471d940
INFO: task kworker/0:172:4002 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 95c78000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:173:4004 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:173 state:D stack:0 pid:4004 tgid:4004 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9a1d84 r8:00000002 r7:60000013 r6:ea9a1d8c r5:84858000
r4:84858000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84858000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471dd40
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8471da80
INFO: task kworker/0:173:4004 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 95c78000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
Workqueue: events bpf_prog_free_deferred
r10:829185c4 r9:ea9a9d84 r8:00000002 r7:60000013 r6:ea9a9d8c r5:84858c00
r4:84858c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84858c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8471df40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84858c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff5b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508cb8c r4:8508c800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8508cb8c r4:84aa0b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84858c00 r8:84aa0bac r7:82804d40 r6:dddced40 r5:dddced60
r4:84aa0b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa0b80 r8:8027ed34 r7:ea9a1e60 r6:84aa0c80 r5:84858c00
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 800d0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:175:4008 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:175 state:D stack:0 pid:4008 tgid:4008 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9a5d84 r8:00000002 r7:60000113 r6:ea9a5d8c r5:84859800
r4:84859800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84859800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84103040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84859800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff73000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508cf8c r4:8508cc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8508cf8c r4:84aa0c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84859800 r8:84aa0c2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84aa0c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa0c00 r8:8027ed34 r7:ea9a9e60 r6:84aa0d00 r5:84859800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9a5fb0 to 0xea9a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84103080
INFO: task kworker/0:175:4008 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9657f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:176:4011 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:176 state:D stack:0 pid:4011 tgid:4011 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9b1d84 r8:00000002 r7:60000113 r6:ea9b1d8c r5:8485a400
r4:8485a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8485a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84103240
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8485a400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508d38c r4:8508d000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84aa0d80 r8:8027ed34 r7:ea9a5e60 r6:84aa0e80 r5:8485a400
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:177:4012 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:177 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9add84 r8:00000002 r7:60000113 r6:ea9add8c r5:8485b000
r4:8485b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8485b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ade08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84103480
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8485b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffb3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508d78c r4:8508d400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8508d78c r4:84aa0e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8485b000 r8:84aa0e2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84aa0e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84aa0e00 r8:8027ed34 r7:ea9b1e60 r6:84aa0f00 r5:8485b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9adfb0 to 0xea9adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84103180
INFO: task kworker/0:177:4012 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r4:00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:178:4014 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:178 state:D stack:0 pid:4014 tgid:4014 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:8485bc00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:e04f3000
r7:dddced40 r6:83018000 r5:8508ef8c r4:84aa0f80
r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: 971b9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:179:4016 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:179 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:8485d400 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84782080 r8:8027ed34 r7:ea9b9e60 r6:84782100 r5:8485d400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
1d20: 979f8000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:180 state:D stack:0 pid:4018 tgid:4018 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9bdd84 r8:00000002 r7:60000113 r6:ea9bdd8c r5:8485e000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
1d60: 800d0013 ffffffff
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:181:4019 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace:
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c5e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r7:dddced40 r6:83018000 r5:8508e78c r4:84782200
Exception stack(0xea9c5fb0 to 0xea9c5ff8)
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:dff61dc0
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:274:4021 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:274 state:D stack:0 pid:4021 tgid:4021 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9c9d84 r8:00000002 r7:60000113 r6:ea9c9d8c r5:8485c800
r4:8485c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8485c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85014100
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8485c800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0489000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508e38c r4:8508e000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8508e38c r4:84a83000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8485c800 r8:84a8302c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a83000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a83000 r8:8027ed34 r7:ea96de60 r6:84a83200 r5:8485c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9c9fb0 to 0xea9c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85014100
INFO: task kworker/1:274:4021 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9821f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:275:4023 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:275 state:D stack:0 pid:4023 tgid:4023 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9d1d84 r8:00000002 r7:60000113 r6:ea9d1d8c r5:85052400
r4:85052400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85052400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r4:00000000
r5:845a0b8c r4:845a0800
r4:84a83180
Exception stack(0xea9d1fb0 to 0xea9d1ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:00000000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84103c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85051800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04d1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508eb8c r4:8508e800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8508eb8c r4:84782380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85051800 r8:847823ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84782380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84782380 r8:8027ed34 r7:ea9b9e60 r6:84a83300 r5:85051800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9d9fb0 to 0xea9d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84103bc0
INFO: task kworker/0:182:4026 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
Exception stack(0xdff61d20 to 0xdff61d68)
r4:dff61dc0
r4:00000000
r5:84acb38c r4:84acb000
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:183:4028 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:183 state:D stack:0 pid:4028 tgid:4028 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9e5d84 r8:00000002 r7:60000013 r6:ea9e5d8c r5:85050000
r4:85050000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85050000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84103f40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85050000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0517000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508f38c r4:8508f000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8508f38c r4:84782400
r10:00000000 r9:84782400 r8:8027ed34 r7:ea9b9e60 r6:84a83380 r5:85050000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 98e2f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
1fa0: 00000000 00000000 00000000 00000000
task:kworker/0:184 state:D stack:0 pid:4029 tgid:4029 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85053c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0583000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8508ff8c r4:8508fc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8508ff8c r4:84782480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85053c00 r8:847824ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84782480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84782480 r8:8027ed34 r7:ea9e5e60 r6:84a83400 r5:85053c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9e9fb0 to 0xea9e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84103d00
INFO: task kworker/0:184:4029 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
Exception stack(0xdff61d20 to 0xdff61d68)
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
r4:84b73ac0
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08
r4:00000000
r5:8508f78c r4:8508f400
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/0:186 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ede08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001000
r4:84782580
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Exception stack(0xdff61d20 to 0xdff61d68)
r4:00000000
r5:84acb38c r4:84acb000
Exception stack(0xdff61fb0 to 0xdff61ff8)
INFO: task kworker/0:187:4037 blocked for more than 463 seconds.
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001380
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84849800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0597000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8509438c r4:85094000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8509438c r4:84782700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84849800 r8:8478272c r7:82804d40 r6:dddced40 r5:dddced60
r4:84782700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84782700 r8:8027ed34 r7:ea9e9e60 r6:84782780 r5:84849800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f1fb0 to 0xea9f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85001180
INFO: task kworker/0:187:4037 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9a10e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:188:4038 blocked for more than 463 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:188 state:D stack:0 pid:4038 tgid:4038 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85094b8c r4:85094800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85094b8c r4:84782800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8484a400 r8:8478282c r7:82804d40 r6:dddced40 r5:dddced60
r4:84782800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84782800 r8:8027ed34 r7:ea9f1e60 r6:84782880 r5:8484a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f9fb0 to 0xea9f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85001180
INFO: task kworker/0:188:4038 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9a30d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:82abe1e4
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:189 state:D stack:0 pid:4040 tgid:4040 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9fdd84 r8:00000002 r7:60000113 r6:ea9fdd8c r5:8484b000
r4:8484b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8484b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9fde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8484b000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05f5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8509478c r4:85094400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8509478c r4:84782900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8484b000 r8:8478292c r7:82804d40 r6:dddced40 r5:dddced60
r4:84782900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84782900 r8:8027ed34 r7:ea9f9e60 r6:84782a00 r5:8484b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:00000000
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
INFO: task kworker/0:190:4042 blocked for more than 464 seconds.
r4:8484bc00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e067f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85094f8c r4:85094c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85094f8c r4:84782980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8484bc00 r8:847829ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84782980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84782980 r8:8027ed34 r7:ea9f9e60 r6:84782a80 r5:8484bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa01fb0 to 0xeaa01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85001600
INFO: task kworker/0:190:4042 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9ad72000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:191:4044 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:191 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa05d84 r8:00000002 r7:60000013 r6:eaa05d8c r5:8484c800
r4:8484c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8484c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8484c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0757000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8484c800 r8:84782b2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84782b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84782b00 r8:8027ed34 r7:eaa01e60 r6:84782b80 r5:8484c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa05fb0 to 0xeaa05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85001740
INFO: task kworker/0:191:4044 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9afc6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:192:4046 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:192 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea9cdd84 r8:00000002 r7:60000013 r6:ea9cdd8c r5:8484e000
r4:8484e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8484e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850019c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8484e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0695000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8509538c r4:85095000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:8484e000 r8:84782c2c r7:82804d40 r6:dddced40 r5:dddced60
Exception stack(0xea9cdfb0 to 0xea9cdff8)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85001900
INFO: task kworker/0:192:4046 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9b5b4000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a740c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8484ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa41000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85096b8c r4:85096800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85096b8c r4:84782c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8484ec00 r8:84782cac r7:82804d40 r6:dddced40 r5:dddced60
r4:84782c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84782c80 r8:8027ed34 r7:eaa05e60 r6:84a83480 r5:8484ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa09fb0 to 0xeaa09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85001b00
INFO: task kworker/0:193:4048 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9bcb5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fa0: 00000000 00000000 00000000 00000000
r4:84b73ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:194 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa19d84 r8:00000002 r7:60000113 r6:eaa19d8c r5:85055400
r4:85055400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85055400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa19e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001cc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85055400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa0d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85095b8c r4:85095800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85095b8c r4:84782e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85055400 r8:84782e2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84782e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: 9bef2000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:dff61dc0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:195:4051 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:195 state:D stack:0 pid:4051 tgid:4051 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa21d84 r8:00000002 r7:60000013 r6:eaa21d8c r5:85054800
r4:85054800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85054800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001e80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85054800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa23000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85095f8c r4:85095c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85095f8c r4:84782e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85054800 r8:84782eac r7:82804d40 r6:dddced40 r5:dddced60
r4:84782e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84782e80 r8:8027ed34 r7:eaa09e60 r6:84a83580 r5:85054800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:82abe1e4
r4:dff61dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:196:4054 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:196 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa39d84 r8:00000002 r7:60000013 r6:eaa39d8c r5:85053000
r4:85053000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85053000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001f40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85053000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa29000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8509638c r4:85096000
r7:dddced40 r6:83018000 r5:8509638c r4:84782d80
r4:00000001
9fa0: 00000000 00000000 00000000 00000000
r4:85001f00
INFO: task kworker/0:196:4054 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9c9fe000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
r4:84b73ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08
r4:00000000
r5:00001000 r4:eaa3b000
r7:dddced40 r6:83018000 r5:8509678c r4:84782f80
r10:00000000 r9:84782f80 r8:8027ed34 r7:eaa09e60 r6:84782f00 r5:8484d400
Exception stack(0xeaa11fb0 to 0xeaa11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8471dfc0
INFO: task kworker/0:197:4055 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9ce67000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:198:4058 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:198 state:D stack:0 pid:4058 tgid:4058 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa35d84 r8:00000002 r7:60000013 r6:eaa35d8c r5:84948000
r4:84948000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84948000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a74200
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84948000 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df95f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85096f8c r4:85096c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85096f8c r4:84a75100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84948000 r8:84a7512c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75100 r8:8027ed34 r7:eaa09e60 r6:84a75080 r5:84948000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa35fb0 to 0xeaa35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a74000
INFO: task kworker/0:198:4058 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9d56a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:84acb38c r4:84acb000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:199:4060 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:199 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:e4785d84 r8:00000002 r7:60000013 r6:e4785d8c r5:85056000
r4:85056000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85056000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4785e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a74380
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85056000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9ab000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8509738c r4:85097000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8509738c r4:84a75000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85056000 r8:84a7502c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75000 r8:8027ed34 r7:eaa35e60 r6:84a83680 r5:85056000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4785fb0 to 0xe4785ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a74140
INFO: task kworker/0:199:4060 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9d56a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r5:84acb38c r4:84acb000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8805e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a74540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85050c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa0b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8509778c r4:85097400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8509778c r4:84a75200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85050c00 r8:84a7522c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75200 r8:8027ed34 r7:e4785e60 r6:84a83700 r5:85050c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8805fb0 to 0xe8805ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a74140
INFO: task kworker/0:200:4062 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9d960000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
r4:82abe1e4
r4:00000000
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:201:4065 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:201 state:D stack:0 pid:4065 tgid:4065 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8d5d84 r8:00000002 r7:60000113 r6:ea8d5d8c r5:8504bc00
r4:8504bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8504bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a747c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8504bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfafb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85097f8c r4:85097c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85097f8c r4:84a75180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8504bc00 r8:84a751ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75180 r8:8027ed34 r7:e8805e60 r6:84a83780 r5:8504bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8d5fb0 to 0xea8d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a74480
INFO: task kworker/0:201:4065 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
Exception stack(0xdff61d20 to 0xdff61d68)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:202:4066 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:202 state:D stack:0 pid:4066 tgid:4066 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea8edd84 r8:00000002 r7:60000113 r6:ea8edd8c r5:84850000
r4:84850000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84850000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ede08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a74640
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84850000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa7f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85097b8c r4:85097800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85097b8c r4:84a75280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84850000 r8:84a752ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75280 r8:8027ed34 r7:ea8d5e60 r6:84a83800 r5:84850000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8edfb0 to 0xea8edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a74480
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:82abe1e4
r4:dff61dc0
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:203:4068 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:203 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea909d84 r8:00000002 r7:60000113 r6:ea909d8c r5:84851800
r4:84851800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84851800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:e0465000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
1d20: 9e96e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:204:4069 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:204 state:D stack:0 pid:4069 tgid:4069 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ea925d84 r8:00000002 r7:60000113 r6:ea925d8c r5:84852400
r4:84852400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84852400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea925e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a74900
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84a75300 r8:8027ed34 r7:ea909e60 r6:84a83900 r5:84852400
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:00000000
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
INFO: task kworker/0:205:4071 blocked for more than 464 seconds.
r10:829185c4 r9:eaa55d84 r8:00000002 r7:60000113 r6:eaa55d8c r5:84853c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:dfd63000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a078c r4:850a0400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a078c r4:84a75400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84853c00 r8:84a7542c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75400 r8:8027ed34 r7:ea909e60 r6:84a83980 r5:84853c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa55fb0 to 0xeaa55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a74840
INFO: task kworker/0:205:4071 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9f0ee000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa5de08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a74bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84853000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe75000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a0b8c r4:850a0800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a0b8c r4:84a75500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84853000 r8:84a7552c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75500 r8:8027ed34 r7:ea909e60 r6:84a83a00 r5:84853000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa5dfb0 to 0xeaa5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a74980
INFO: task kworker/0:206:4073 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: 9f79f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:207:4075 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
task:kworker/0:207 state:D stack:0 pid:4075 tgid:4075 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84850c00 r8:84a755ac r7:82804d40 r6:dddced40 r5:dddced60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
r4:82abe1e4
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:208:4077 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:208 state:D stack:0 pid:4077 tgid:4077 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa6dd84 r8:00000002 r7:60000113 r6:eaa6dd8c r5:84854800
r4:84854800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84854800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a74e00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84854800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e003d000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84a75480
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:209:4079 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:209 state:D stack:0 pid:4079 tgid:4079 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa75d84 r8:00000002 r7:60000013 r6:eaa75d8c r5:84855400
r4:84855400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84855400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a74f40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84855400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00a3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a178c r4:850a1400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a178c r4:84a75680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84855400 r8:84a756ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75680 r8:8027ed34 r7:ea909e60 r6:84a83b80 r5:84855400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa75fb0 to 0xeaa75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a74d40
INFO: task kworker/0:209:4079 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a0311000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
r5:84acb38c r4:84acb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:210:4081 blocked for more than 464 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:210 state:D stack:0 pid:4081 tgid:4081 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa7dd84 r8:00000002 r7:60000013 r6:eaa7dd8c r5:84856000
r4:84856000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84856000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84736980
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84856000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03b9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a1b8c r4:850a1800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a1b8c r4:84a75700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84856000 r8:84a7572c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75700 r8:8027ed34 r7:ea909e60 r6:84a83c00 r5:84856000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa7dfb0 to 0xeaa7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84736a80
INFO: task kworker/0:210:4081 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a06ef000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
r4:dff61dc0
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:211:4083 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:211 state:D stack:0 pid:4083 tgid:4083 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa85d84 r8:00000002 r7:60000013 r6:eaa85d8c r5:84856c00
r4:84856c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84856c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85014a80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84856c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03eb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a1f8c r4:850a1c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a1f8c r4:84a75780
r10:00000000 r9:84a75780 r8:8027ed34 r7:ea909e60 r6:84a83c80 r5:84856c00
Exception stack(0xeaa85fb0 to 0xeaa85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84736a80
INFO: task kworker/0:211:4083 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a0b6a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:84b6f800
1fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/0:212:4085 blocked for more than 465 seconds.
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a238c r4:84a75600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85042400 r8:84a7562c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75600 r8:8027ed34 r7:ea909e60 r6:84a83d00 r5:85042400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa8dfb0 to 0xeaa8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85062080
INFO: task kworker/0:212:4085 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a0cf0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:84b6f800
1fa0: 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
Call trace:
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062200
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85058c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e042b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a278c r4:850a2400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a278c r4:84a75800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85058c00 r8:84a7582c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75800 r8:8027ed34 r7:ea909e60 r6:84a83d80 r5:85058c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa95fb0 to 0xeaa95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850621c0
INFO: task kworker/0:213:4087 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a0f8d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:214:4089 blocked for more than 465 seconds.
Workqueue: events bpf_prog_free_deferred
r5:84949800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0005e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062380
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84949800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0449000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a2b8c r4:850a2800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a2b8c r4:84a75900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84949800 r8:84a7592c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75900 r8:8027ed34 r7:ea909e60 r6:84a75980 r5:84949800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0005fb0 to 0xe0005ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85062140
INFO: task kworker/0:214:4089 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a11be000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:215:4092 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:215 state:D stack:0 pid:4092 tgid:4092 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa9dd84 r8:00000002 r7:60000113 r6:eaa9dd8c r5:8494a400
r4:8494a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8494a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062640
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8494a400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06ed000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a338c r4:850a3000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a338c r4:84a75880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8494a400 r8:84a758ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75880 r8:8027ed34 r7:ea909e60 r6:84a75a80 r5:8494a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa9dfb0 to 0xeaa9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850622c0
INFO: task kworker/0:215:4092 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a1601000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:216:4094 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:216 state:D stack:0 pid:4094 tgid:4094 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaaa9d84 r8:00000002 r7:60000113 r6:eaaa9d8c r5:8505a400
r4:8505a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8505a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b57500
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8505a400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8809000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a4b8c r4:850a4800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a4b8c r4:84a75a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8505a400 r8:84a75a2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75a00 r8:8027ed34 r7:eaa9de60 r6:84a83f80 r5:8505a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa9fb0 to 0xeaaa9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85062580
INFO: task kworker/0:216:4094 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a19a6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:217:4096 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:217 state:D stack:0 pid:4096 tgid:4096 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaab1d84 r8:00000002 r7:60000013 r6:eaab1d8c r5:85058000
r4:85058000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85058000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85058000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e077b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a378c r4:850a3400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a378c r4:84a75c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85058000 r8:84a75c2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75c00 r8:8027ed34 r7:eaaa9e60 r6:84a83e00 r5:85058000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaab1fb0 to 0xeaab1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850626c0
INFO: task kworker/0:217:4096 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a1dfb000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:218 state:D stack:0 pid:4097 tgid:4097 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062840
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8494b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e4789000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a3b8c r4:850a3800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a3b8c r4:84a75b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8494b000 r8:84a75bac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75b80 r8:8027ed34 r7:eaaa9e60 r6:84a75b00 r5:8494b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa1fb0 to 0xeaaa1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850626c0
INFO: task kworker/0:218:4097 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a2182000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84b6f800
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:219 state:D stack:0 pid:4100 tgid:4100 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a3f8c r4:850a3c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a3f8c r4:84a75c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8494bc00 r8:84a75cac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75c80 r8:8027ed34 r7:eaaa9e60 r6:84a75d80 r5:8494bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaadfb0 to 0xeaaadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85062980
INFO: task kworker/0:219:4100 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a2797000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062c40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8494c800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47c5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a438c r4:850a4000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a438c r4:84a75d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8494c800 r8:84a75d2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75d00 r8:8027ed34 r7:eaaa9e60 r6:84a75e00 r5:8494c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa1dfb0 to 0xeaa1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85062980
INFO: task kworker/0:220:4101 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a2988000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:221:4103 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:221 state:D stack:0 pid:4103 tgid:4103 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaabdd84 r8:00000002 r7:60000113 r6:eaabdd8c r5:8494e000
r4:8494e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8494e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062d80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8494e000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47db000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a478c r4:850a4400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a478c r4:84a75e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8494e000 r8:84a75eac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75e80 r8:8027ed34 r7:eaaa9e60 r6:84a75f00 r5:8494e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaabdfb0 to 0xeaabdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85062dc0
INFO: task kworker/0:221:4103 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a3238000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:222:4105 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:222 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaac1d84 r8:00000002 r7:60000113 r6:eaac1d8c r5:8494ec00
r4:8494ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8494ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f1080
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8494ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e881b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a4f8c r4:850a4c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a4f8c r4:84a75f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8494ec00 r8:84a75fac r7:82804d40 r6:dddced40 r5:dddced60
r4:84a75f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a75f80 r8:8027ed34 r7:eaaa9e60 r6:85012f00 r5:8494ec00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 800d0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:84b73ac0
task:kworker/0:223 state:D stack:0 pid:4109 tgid:4109 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaab9d84 r8:00000002 r7:60000013 r6:eaab9d8c r5:8494d400
r4:8494d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8494d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f11c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8494d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8825000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a538c r4:850a5000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a538c r4:850f5100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8494d400 r8:850f512c r7:82804d40 r6:dddced40 r5:dddced60
r4:850f5100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850f5100 r8:8027ed34 r7:eaac1e60 r6:850f5080 r5:8494d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaab9fb0 to 0xeaab9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f1180
INFO: task kworker/0:223:4109 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a4129000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r5:00001000 r4:dfcaf000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.16.0-rc1-syzkaller #0
r10:829185c4 r9:eaac9d84 r8:00000002 r7:60000113 r6:eaac9d8c r5:84948c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f1800
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84948c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8863000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a638c r4:850a6000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a638c r4:850f5000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84948c00 r8:850f502c r7:82804d40 r6:dddced40 r5:dddced60
r4:850f5000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850f5000 r8:8027ed34 r7:eaab9e60 r6:850f5200 r5:84948c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaac9fb0 to 0xeaac9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f1100
INFO: task kworker/0:224:4110 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a4129000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:82abe1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:84b6f800
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:225 state:D stack:0 pid:4112 tgid:4112 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaacde08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e883b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a578c r4:850a5400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a578c r4:850f5180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848e8000 r8:850f51ac r7:82804d40 r6:dddced40 r5:dddced60
r4:850f5180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850f5180 r8:8027ed34 r7:eaac9e60 r6:850f5300 r5:848e8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaacdfb0 to 0xeaacdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f1300
INFO: task kworker/0:225:4112 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a44fa000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:226:4114 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:226 state:D stack:0 pid:4114 tgid:4114 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaad1d84 r8:00000002 r7:60000013 r6:eaad1d8c r5:848e8c00
r4:848e8c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848e8c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f1500
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:848e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e884d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a5b8c r4:850a5800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a5b8c r4:850f5280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848e8c00 r8:850f52ac r7:82804d40 r6:dddced40 r5:dddced60
r4:850f5280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850f5280 r8:8027ed34 r7:eaac9e60 r6:850f5400 r5:848e8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaad1fb0 to 0xeaad1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f1440
INFO: task kworker/0:226:4114 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a480d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:227:4117 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:227 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaad5d84 r8:00000002 r7:60000113 r6:eaad5d8c r5:848e9800
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced40 r6:83018000 r5:850a5f8c r4:850f5380
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaad5fb0 to 0xeaad5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f15c0
INFO: task kworker/0:227:4117 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a53f6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:228:4118 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:228 state:D stack:0 pid:4118 tgid:4118 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r4:848ea400
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:e8875000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:850f5480 r8:8027ed34 r7:eaac9e60 r6:850f5580 r5:848ea400
Exception stack(0xeaac5fb0 to 0xeaac5ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:850f1740
INFO: task kworker/0:228:4118 is blocked on a mutex likely owned by task kworker/1:79:3493.
Call trace:
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:dff61dc0
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84b6f800
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Not tainted 6.16.0-rc1-syzkaller #0
r10:829185c4 r9:eaad9d84 r8:00000002 r7:60000013 r6:eaad9d8c r5:848eb000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:848eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea881000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a6b8c r4:850a6800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a6b8c r4:850f5600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848eb000 r8:850f562c r7:82804d40 r6:dddced40 r5:dddced60
r4:850f5600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850f5600 r8:8027ed34 r7:eaac5e60 r6:850f5700 r5:848eb000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaad9fb0 to 0xeaad9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f1900
INFO: task kworker/0:229:4120 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a5978000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:230:4122 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:230 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:848ec800 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08
r9:83018005 r8:848ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
r10:00000000 r9:850f5680 r8:8027ed34 r7:eaad9e60 r6:850f5780 r5:848ec800
Workqueue: events bpf_prog_free_deferred
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:231:4124 blocked for more than 465 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:231 state:D stack:0 pid:4124 tgid:4124 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaae5d84 r8:00000002 r7:60000013 r6:eaae5d8c r5:848ed400
r4:848ed400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848ed400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107200
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:848ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8dd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a7b8c r4:850a7800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a7b8c r4:850f5800
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Exception stack(0xdff61d20 to 0xdff61d68)
r4:00000000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:232:4126 blocked for more than 465 seconds.
r4:848eec00
r5:848eec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f1f40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:848eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8ab000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850a738c r4:850a7000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850a738c r4:850f5900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848eec00 r8:850f592c r7:82804d40 r6:dddced40 r5:dddced60
r4:850f5900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850f5900 r8:8027ed34 r7:eaae5e60 r6:850f5a00 r5:848eec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaae9fb0 to 0xeaae9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f1e80
INFO: task kworker/0:232:4126 is blocked on a mutex likely owned by task kworker/1:79:3493.
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08
r4:00000000
r7:dddced40 r6:83018000 r5:850a778c r4:850f5980
dfa0: 00000000 00000000 00000000 00000000
r4:850f1c40
INFO: task kworker/0:233:4128 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a657d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84941800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:61c88647 r9:84941800 r8:850f5aac r7:82804d40 r6:dddced40 r5:dddced60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85107140
INFO: task kworker/0:234:4130 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a6d29000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
r4:82abe1e4
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r4:00000001
INFO: task kworker/0:235:4132 blocked for more than 466 seconds.
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:850f5b80
Exception stack(0xeaaf9fb0 to 0xeaaf9ff8)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:8505d400
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107840
r4:850f5d00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85107600
INFO: task kworker/0:236:4135 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a7678000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
r4:84b73ac0
task:kworker/0:237 state:D stack:0 pid:4137 tgid:4137 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:850f5d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850f5d80 r8:8027ed34 r7:eab01e60 r6:84a83e80 r5:8505e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab09fb0 to 0xeab09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85107800
INFO: task kworker/0:237:4137 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a7c72000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:238:4138 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:238 state:D stack:0 pid:4138 tgid:4138 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab11d84 r8:00000002 r7:60000113 r6:eab11d8c r5:8505ec00
r4:8505ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8505ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851079c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8505ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:8505ec00 r8:850f5eac r7:82804d40 r6:dddced40 r5:dddced60
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:850acf8c r4:850acc00
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:00000000
r5:800d0013 r4:80239bd0
r4:00000000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:240:4142 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:240 state:D stack:0 pid:4142 tgid:4142 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab1dd84 r8:00000002 r7:60000113 r6:eab1dd8c r5:8505c800
r4:8505c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8505c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107c40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8505c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea961000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:8505c800 r8:850f5e2c r7:82804d40 r6:dddced40 r5:dddced60
Workqueue: events bpf_prog_free_deferred
r4:82abe1e4
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:241:4144 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:241 state:D stack:0 pid:4144 tgid:4144 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab25d84 r8:00000002 r7:60000113 r6:eab25d8c r5:85056c00
r4:85056c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85056c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851073c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85056c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab31000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
Exception stack(0xeab25fb0 to 0xeab25ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace:
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:dff61dc0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:242:4146 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:242 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaaf5d84 r8:00000002 r7:60000113 r6:eaaf5d8c r5:84943000
r4:84943000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84943000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107ec0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84943000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab2b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850adb8c r4:850ad800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850adb8c r4:8510e100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84943000 r8:8510e12c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510e100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510e100 r8:8027ed34 r7:eab25e60 r6:8510e000 r5:84943000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaf5fb0 to 0xeaaf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85107d00
INFO: task kworker/0:242:4146 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a8d79000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:243:4149 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:243 state:D stack:0 pid:4149 tgid:4149 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab29d84 r8:00000002 r7:60000113 r6:eab29d8c r5:84943c00
r4:84943c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84943c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85115240
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84943c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab45000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ae78c r4:850ae400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850ae78c r4:8510e080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84943c00 r8:8510e0ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510e080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510e080 r8:8027ed34 r7:eab25e60 r6:8510e200 r5:84943c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab29fb0 to 0xeab29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85107f40
INFO: task kworker/0:243:4149 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d60: 800d0013 ffffffff
r4:82abe1e4
r4:dff61dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:84b6f800
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:244:4150 blocked for more than 466 seconds.
r10:829185c4 r9:eaaddd84 r8:00000002 r7:60000113 r6:eaaddd8c r5:84944800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84944800 r8:8510e32c r7:82804d40 r6:dddced40 r5:dddced60
Exception stack(0xeaaddfb0 to 0xeaaddff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace:
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r4:dff61dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:245:4153 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:245 state:D stack:0 pid:4153 tgid:4153 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab3dd84 r8:00000002 r7:60000113 r6:eab3dd8c r5:84945400
r4:84945400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84945400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85115540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84945400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab59000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850aef8c r4:850aec00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850aef8c r4:8510e180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84945400 r8:8510e1ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510e180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510e180 r8:8027ed34 r7:eab29e60 r6:8510e400 r5:84945400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab3dfb0 to 0xeab3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85115180
INFO: task kworker/0:245:4153 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a9f74000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:246:4154 blocked for more than 466 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:eab53000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:84946000 r8:8510e3ac r7:82804d40 r6:dddced40 r5:dddced60
r10:00000000 r9:8510e380 r8:8027ed34 r7:eab3de60 r6:8510e500 r5:84946000
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab51fb0 to 0xeab51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85115380
INFO: task kworker/0:246:4154 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: a9f74000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:247:4156 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:247 state:D stack:0 pid:4156 tgid:4156 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab49d84 r8:00000002 r7:60000113 r6:eab49d8c r5:84946c00
r4:84946c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84946c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85115740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84946c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab67000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850af38c r4:850af000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850af38c r4:8510e480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84946c00 r8:8510e4ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510e480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510e480 r8:8027ed34 r7:eab3de60 r6:8510e600 r5:84946c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab49fb0 to 0xeab49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85115500
INFO: task kworker/0:247:4156 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: aa2dd000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:248:4158 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:248 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:84942400
r4:84942400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84942400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a73e40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84942400 r7:00000000 r6:83018000 r5:00001000 r4:7f103000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead29000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851ac78c r4:851ac400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851ac78c r4:8510e580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84942400 r8:8510e5ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510e580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510e580 r8:8027ed34 r7:eab49e60 r6:8510e680 r5:84942400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab5dfb0 to 0xeab5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85115480
INFO: task kworker/0:248:4158 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: aa88a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:249:4159 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:249 state:D stack:0 pid:4159 tgid:4159 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab71d84 r8:00000002 r7:60000113 r6:eab71d8c r5:848ee000
r4:848ee000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848ee000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85115a80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:848ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab7b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850af78c r4:850af400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850af78c r4:8510e700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848ee000 r8:8510e72c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510e700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510e700 r8:8027ed34 r7:eab5de60 r6:8510e800 r5:848ee000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab71fb0 to 0xeab71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85115680
INFO: task kworker/0:249:4159 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: aab47000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:84b73ac0
task:kworker/1:276 state:D stack:0 pid:4162 tgid:4162 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:85112100 r8:8027ed34 r7:ea96de60 r6:85112200 r5:85170000
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850ff8c0
INFO: task kworker/1:276:4162 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: aaeb1000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:250:4164 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:250 state:D stack:0 pid:4164 tgid:4164 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:85172400
r4:85172400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85172400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85115bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85172400 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab81000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850afb8c r4:850af800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:850afb8c r4:8510e780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85172400 r8:8510e7ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510e780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510e780 r8:8027ed34 r7:eab5de60 r6:85112180 r5:85172400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab89fb0 to 0xeab89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d60: 800d0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:277:4169 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:277 state:D stack:0 pid:4169 tgid:4169 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab91d84 r8:00000002 r7:60000013 r6:eab91d8c r5:85173c00
r4:85173c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85173c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85127080
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85173c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc77000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850d038c r4:850d0000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850d038c r4:85112280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85173c00 r8:851122ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85112280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85112280 r8:8027ed34 r7:ea96de60 r6:85112380 r5:85173c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab91fb0 to 0xeab91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85127100
INFO: task kworker/1:277:4169 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ab6d5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:278 state:D stack:0 pid:4171 tgid:4171 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850d0b8c r4:850d0800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850d0b8c r4:85112300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85173000 r8:8511232c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85112300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85112300 r8:8027ed34 r7:ea96de60 r6:85112480 r5:85173000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa2dfb0 to 0xeaa2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85127280
INFO: task kworker/1:278:4171 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: aba00000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:279:4173 blocked for more than 466 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:279 state:D stack:0 pid:4173 tgid:4173 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab79d84 r8:00000002 r7:60000013 r6:eab79d8c r5:85174800
r4:85174800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85174800 r4:829185c0
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:85112400 r8:8027ed34 r7:eaa2de60 r6:85112580 r5:85174800
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: abf14000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:251:4175 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:251 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08
r7:dddced40 r6:83018000 r5:851ac38c r4:8510e900
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:280:4176 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
Call trace:
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85127780
r10:00000000 r9:85112680 r8:8027ed34 r7:eab79e60 r6:85112780 r5:85176000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ac8c6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:281:4178 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab95d84 r8:00000002 r7:60000113 r6:eab95d8c r5:85176c00
r4:85176c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85176c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851279c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85176c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff31000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850d178c r4:850d1400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850d178c r4:85112800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85176c00 r8:8511282c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85112800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85112800 r8:8027ed34 r7:eab99e60 r6:85112700 r5:85176c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab95fb0 to 0xeab95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85127740
INFO: task kworker/1:281:4178 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ac8c6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:282:4180 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:282 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab9dd84 r8:00000002 r7:60000113 r6:eab9dd8c r5:85170c00
r4:85170c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85170c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08
r4:00000000
r4:00000000
r7:ddde2d40 r6:83018200 r5:850d1b8c r4:85112600
r4:85127900
r4:00000000
r4:dff61dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/1:283:4182 blocked for more than 467 seconds.
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:85112900 r8:8027ed34 r7:eab9de60 r6:85112980 r5:85171800
r4:85127a40
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:284:4183 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:284 state:D stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:85059800
r4:85059800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85059800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85127dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85059800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff7d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850d1f8c r4:850d1c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850d1f8c r4:85112a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85059800 r8:85112a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85112a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85112a00 r8:8027ed34 r7:eaba1e60 r6:85112a80 r5:85059800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaba9fb0 to 0xeaba9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85127a40
INFO: task kworker/1:284:4183 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:285:4186 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:285 state:D stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaba5d84 r8:00000002 r7:60000113 r6:eaba5d8c r5:8505b000
r4:8505b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8505b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:8505b000 r8:85112b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r10:00000000 r9:85112b00 r8:8027ed34 r7:eaba1e60 r6:85112b80 r5:8505b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaba5fb0 to 0xeaba5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85127e80
INFO: task kworker/1:285:4186 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ad77c000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:286:4188 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:286 state:D stack:0 pid:4188 tgid:4188 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabb1d84 r8:00000002 r7:60000013 r6:eabb1d8c r5:851e0000
r4:851e0000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e0000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85111000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e047d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850d2b8c r4:850d2800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850d2b8c r4:85112c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e0000 r8:85112c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85112c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:800d0013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:287:4190 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:287 state:D stack:0 pid:4190 tgid:4190 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabadd84 r8:00000002 r7:60000013 r6:eabadd8c r5:851e1800
r4:851e1800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e1800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabade08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85111440
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04db000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850d338c r4:850d3000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850d338c r4:85112d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e1800 r8:85112d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85112d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85112d00 r8:8027ed34 r7:eabb1e60 r6:85112d80 r5:851e1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabadfb0 to 0xeabadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85111180
INFO: task kworker/1:287:4190 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: add05000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
r4:851e2400
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r9:83018205 r8:851e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04af000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850d2f8c r4:850d2c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850d2f8c r4:85112e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e2400 r8:85112e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85112e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85112e00 r8:8027ed34 r7:eabade60 r6:85112e80 r5:851e2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabb5fb0 to 0xeabb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85111280
INFO: task kworker/1:288:4192 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: add05000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:289:4194 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:289 state:D stack:0 pid:4194 tgid:4194 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabb9d84 r8:00000002 r7:60000113 r6:eabb9d8c r5:851e3000
r4:851e3000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e3000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851115c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0511000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850d378c r4:850d3400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850d378c r4:8510f100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e3000 r8:8510f12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r10:00000000 r9:8510f100 r8:8027ed34 r7:eabade60 r6:8510f000 r5:851e3000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:290:4197 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:290 state:D stack:0 pid:4197 tgid:4197 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:851e3c00
r4:851e3c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e3c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85111740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e054d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:850d3b8c r4:850d3800
r10:61c88647 r9:851e3c00 r8:8510f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85111500
INFO: task kworker/1:290:4197 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ae4f7000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.16.0-rc1-syzkaller #0
r10:829185c4 r9:eabc1d84 r8:00000002 r7:60000113 r6:eabc1d8c r5:851e4800
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r9:83018205 r8:851e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0573000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850d3f8c r4:850d3c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850d3f8c r4:8510f180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e4800 r8:8510f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8510f180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510f180 r8:8027ed34 r7:eabbde60 r6:8510f300 r5:851e4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc1fb0 to 0xeabc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85111680
INFO: task kworker/1:291:4198 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ae4f7000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85111800
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05df000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850dc38c r4:850dc000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850dc38c r4:8510f280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e5400 r8:8510f2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8510f280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510f280 r8:8027ed34 r7:eabc1e60 r6:8510f480 r5:851e5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc5fb0 to 0xeabc5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85111800
INFO: task kworker/1:292:4200 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ae72a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:dff61dc0
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:293:4202 blocked for more than 467 seconds.
r4:851e6000
r5:851e6000 r4:829185c0
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85111bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0665000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850dc78c r4:850dc400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850dc78c r4:8510f500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851e6000 r8:8510f52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8510f500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510f500 r8:8027ed34 r7:eabc5e60 r6:8510f380 r5:851e6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc9fb0 to 0xeabc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85111980
INFO: task kworker/1:293:4202 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: aea1f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:82abe1e4
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:294:4204 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:294 state:D stack:0 pid:4204 tgid:4204 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabcdd84 r8:00000002 r7:60000013 r6:eabcdd8c r5:851e6c00
r4:851e6c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e6c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:851e6c00 r8:8510f42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8510f400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510f400 r8:8027ed34 r7:eabc9e60 r6:8510f680 r5:851e6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabcdfb0 to 0xeabcdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85111b00
INFO: task kworker/1:294:4204 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: aebd8000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
r5:84acb38c r4:84acb000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:295:4206 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:295 state:D stack:0 pid:4206 tgid:4206 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabd1d84 r8:00000002 r7:60000113 r6:eabd1d8c r5:851e0c00
r4:851e0c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851e0c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85111dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0681000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850dcb8c r4:850dc800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:8510f600
Exception stack(0xeabd1fb0 to 0xeabd1ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:296 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabd5d84 r8:00000002 r7:60000113 r6:eabd5d8c r5:85178000
r4:85178000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85178000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fc380
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85178000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa27000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ddf8c r4:850ddc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850ddf8c r4:8510f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85178000 r8:8510f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8510f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510f800 r8:8027ed34 r7:eabcde60 r6:8510f780 r5:85178000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabd5fb0 to 0xeabd5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85111e00
INFO: task kworker/1:296:4208 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: af1da000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:297 state:D stack:0 pid:4209 tgid:4209 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a13000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9d5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850dd38c r4:850dd000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850dd38c r4:8510f580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a13000 r8:8510f5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8510f580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510f580 r8:8027ed34 r7:eabd5e60 r6:8510e980 r5:84a13000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabddfb0 to 0xeabddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85111e00
INFO: task kworker/1:297:4209 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: af3e3000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:298:4212 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:298 state:D stack:0 pid:4212 tgid:4212 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabd9d84 r8:00000002 r7:60000013 r6:eabd9d8c r5:85178c00
r4:85178c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85178c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fc000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85178c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9f3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850dd78c r4:850dd400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850dd78c r4:8510f880
r4:8510f880
r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:299:4214 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:299 state:D stack:0 pid:4214 tgid:4214 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabe5d84 r8:00000002 r7:60000013 r6:eabe5d8c r5:85179800
r4:85179800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85179800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fc1c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85179800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa13000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ddb8c r4:850dd800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850ddb8c r4:8510f980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85179800 r8:8510f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8510f980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510f980 r8:8027ed34 r7:eabd5e60 r6:8510fa80 r5:85179800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabe5fb0 to 0xeabe5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fc100
INFO: task kworker/1:299:4214 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: af93b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:300:4216 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:300 state:D stack:0 pid:4216 tgid:4216 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabe9d84 r8:00000002 r7:60000113 r6:eabe9d8c r5:8517a400
r4:8517a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8517a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fc540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8517a400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
r5:850de38c r4:850de000
r10:61c88647 r9:8517a400 r8:8510fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
9fa0: 00000000 00000000 00000000 00000000
r4:850fc2c0
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: afbfd000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:301:4218 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:301 state:D stack:0 pid:4218 tgid:4218 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabedd84 r8:00000002 r7:60000013 r6:eabedd8c r5:8517b000
r4:8517b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8517b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fc6c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8517b000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa49000
r5:850de78c r4:850de400
r10:61c88647 r9:8517b000 r8:8510fbac r7:82804d40 r6:ddde2d40 r5:ddde2d60
dfa0: 00000000 00000000 00000000 00000000
r4:850fc480
INFO: task kworker/1:301:4218 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b0012000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:302:4220 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:302 state:D stack:0 pid:4220 tgid:4220 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabf1d84 r8:00000002 r7:60000113 r6:eabf1d8c r5:8517bc00
r4:8517bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8517bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fca40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8517bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac01000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850def8c r4:850dec00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850def8c r4:8510fc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8517bc00 r8:8510fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8510fc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510fc00 r8:8027ed34 r7:eabede60 r6:8510fd00 r5:8517bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabf1fb0 to 0xeabf1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fc600
INFO: task kworker/1:302:4220 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b0012000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:303:4221 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:303 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:8517d400
r4:8517d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8517d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fc800
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8517d400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabfb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850deb8c r4:850de800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850deb8c r4:8510fd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8517d400 r8:8510fdac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8510fd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510fd80 r8:8027ed34 r7:eabf1e60 r6:8510fe00 r5:8517d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabf9fb0 to 0xeabf9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fc740
INFO: task kworker/1:303:4221 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b03b6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:304:4224 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:304 state:D stack:0 pid:4224 tgid:4224 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eabe1d84 r8:00000002 r7:60000113 r6:eabe1d8c r5:8517e000
r4:8517e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8517e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fcbc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8517e000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac0b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850df38c r4:850df000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850df38c r4:8510fe80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8517e000 r8:8510feac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8510fe80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510fe80 r8:8027ed34 r7:eabf1e60 r6:8510ff80 r5:8517e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabe1fb0 to 0xeabe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fc980
INFO: task kworker/1:304:4224 is blocked on a mutex likely owned by task kworker/1:79:3493.
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:dff61dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:305:4226 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:305 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:8517ec00
r4:8517ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8517ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fcd00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:850fcb00
INFO: task kworker/1:305:4226 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b084e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:306:4228 blocked for more than 467 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:306 state:D stack:0 pid:4228 tgid:4228 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac15d84 r8:00000002 r7:60000113 r6:eac15d8c r5:8517c800
r4:8517c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8517c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fce80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8517c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac1f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850dfb8c r4:850df800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850dfb8c r4:8506b100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8517c800 r8:8506b12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506b100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506b100 r8:8027ed34 r7:eac09e60 r6:8506b080 r5:8517c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac15fb0 to 0xeac15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fcc40
INFO: task kworker/1:306:4228 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b0cb8000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:307:4230 blocked for more than 468 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac1dd84 r8:00000002 r7:60000013 r6:eac1dd8c r5:85188000
r4:85188000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85188000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84736b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85188000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac25000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850dff8c r4:850dfc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850dff8c r4:8506b000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85188000 r8:8506b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506b000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506b000 r8:8027ed34 r7:eac15e60 r6:8506b200 r5:85188000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac1dfb0 to 0xeac1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fcdc0
INFO: task kworker/1:307:4230 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b15b2000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:308:4232 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:829185c4 r9:eac29d84 r8:00000002 r7:60000113 r6:eac29d8c r5:85188c00
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85064040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85188c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac33000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ec38c r4:850ec000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850ec38c r4:8506b180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85188c00 r8:8506b1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506b180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506b180 r8:8027ed34 r7:eac1de60 r6:8506b280 r5:85188c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac29fb0 to 0xeac29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85064080
INFO: task kworker/1:308:4232 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b15b2000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:309:4234 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
task:kworker/1:309 state:D stack:0 pid:4234 tgid:4234 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:85189800 r4:829185c0
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85064440
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85189800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac47000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ecb8c r4:850ec800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850ecb8c r4:8506b300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85189800 r8:8506b32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506b300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506b300 r8:8027ed34 r7:eac29e60 r6:8506b380 r5:85189800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac31fb0 to 0xeac31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85064080
INFO: task kworker/1:309:4234 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b18f9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:310 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac3dd84 r8:00000002 r7:60000113 r6:eac3dd8c r5:8518a400
r4:8518a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8518a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850642c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8518a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac39000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ec78c r4:850ec400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850ec78c r4:8506b400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8518a400 r8:8506b42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506b400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506b400 r8:8027ed34 r7:eac31e60 r6:8506b500 r5:8518a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac3dfb0 to 0xeac3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85064200
INFO: task kworker/1:310:4236 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b1bf7000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:311:4238 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:311 state:D stack:0 pid:4238 tgid:4238 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac45d84 r8:00000002 r7:60000013 r6:eac45d8c r5:8518b000
r4:8518b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8518b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r9:83018205 r8:8518b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
r5:850ed38c r4:850ed000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85064380
INFO: task kworker/1:311:4238 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b1d23000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:312:4240 blocked for more than 468 seconds.
task:kworker/1:312 state:D stack:0 pid:4240 tgid:4240 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85064580
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ecf8c r4:850ecc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850ecf8c r4:8506b600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8518bc00 r8:8506b62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506b600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506b600 r8:8027ed34 r7:eac45e60 r6:8506b680 r5:8518bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac51fb0 to 0xeac51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85064380
INFO: task kworker/1:312:4240 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b1df6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:313:4242 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:313 state:D stack:0 pid:4242 tgid:4242 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac59d84 r8:00000002 r7:60000013 r6:eac59d8c r5:8518c800
r4:8518c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8518c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85064880
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8518c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac61000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ed78c r4:850ed400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850ed78c r4:8506b700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8518c800 r8:8506b72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506b700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506b700 r8:8027ed34 r7:eac45e60 r6:8506b780 r5:8518c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac59fb0 to 0xeac59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85064680
INFO: task kworker/1:313:4242 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b1df6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:314:4244 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:314 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac65d84 r8:00000002 r7:60000113 r6:eac65d8c r5:8518d400
r4:8518d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8518d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85064a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8518d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac6f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850edb8c r4:850ed800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850edb8c r4:8506b800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8518d400 r8:8506b82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506b800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506b800 r8:8027ed34 r7:eac59e60 r6:8506b900 r5:8518d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac65fb0 to 0xeac65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850647c0
INFO: task kworker/1:314:4244 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b22b5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:315:4246 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:315 state:D stack:0 pid:4246 tgid:4246 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac6dd84 r8:00000002 r7:60000113 r6:eac6dd8c r5:8518e000
r4:8518e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8518e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85064bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8518e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac75000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850edf8c r4:850edc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850edf8c r4:8506b880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8518e000 r8:8506b8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506b880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506b880 r8:8027ed34 r7:eac65e60 r6:8506b980 r5:8518e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac6dfb0 to 0xeac6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85064940
INFO: task kworker/1:315:4246 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b22b5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:eac89000
r5:850ee78c r4:850ee400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850ee78c r4:8506ba00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8518ec00 r8:8506ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506ba00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506ba00 r8:8027ed34 r7:eac6de60 r6:8506bb00 r5:8518ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac79fb0 to 0xeac79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85064b00
INFO: task kworker/1:316:4248 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b244b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:dff61dc0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85064d40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85180000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac83000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850ee38c r4:850ee000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850ee38c r4:8506ba80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85180000 r8:8506baac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506ba80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506ba80 r8:8027ed34 r7:eac79e60 r6:8506bb80 r5:85180000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac81fb0 to 0xeac81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85064c80
INFO: task kworker/1:317:4251 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b2881000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r5:85180c00 r4:829185c0
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fc880
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85180c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac97000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850eeb8c r4:850ee800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850eeb8c r4:8506bc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85180c00 r8:8506bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506bc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506bc00 r8:8027ed34 r7:eac79e60 r6:8506bd00 r5:85180c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac95fb0 to 0xeac95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fcdc0
INFO: task kworker/1:318:4252 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b2881000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:319:4255 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:319 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaca1d84 r8:00000002 r7:60000113 r6:eaca1d8c r5:85181800
r4:85181800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85181800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a76040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85181800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ed000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac9d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850eef8c r4:850eec00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850eef8c r4:8506bc80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85181800 r8:8506bcac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506bc80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506bc80 r8:8027ed34 r7:eac95e60 r6:8506be00 r5:85181800
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:84a76080
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b2881000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:320:4256 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:320 state:D stack:0 pid:4256 tgid:4256 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:85182400
r4:85182400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85182400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a762c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85182400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:85182400 r8:8506bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506bd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506bd80 r8:8027ed34 r7:eaca1e60 r6:8506be80 r5:85182400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac8dfb0 to 0xeac8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a76080
INFO: task kworker/1:320:4256 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b2dd0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:321:4258 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:321 state:D stack:0 pid:4258 tgid:4258 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eacbdd84 r8:00000002 r7:60000113 r6:eacbdd8c r5:84a14800
r4:84a14800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a14800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a76540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a14800 r7:00000000 r6:83018200 r5:00001000 r4:7f0f3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacc7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850efb8c r4:850ef800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850efb8c r4:8506bf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a14800 r8:8506bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506bf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506bf00 r8:8027ed34 r7:eac8de60 r6:8510e880 r5:84a14800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacbdfb0 to 0xeacbdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a76200
INFO: task kworker/1:321:4258 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b3037000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:322:4261 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:322 state:D stack:0 pid:4261 tgid:4261 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eacd9d84 r8:00000002 r7:60000113 r6:eacd9d8c r5:84a16000
r4:84a16000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a16000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a76440
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a16000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacb1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:84a16000 r8:84a6e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:84a76380
INFO: task kworker/1:322:4261 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b3037000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:323 state:D stack:0 pid:4262 tgid:4262 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eacddd84 r8:00000002 r7:60000113 r6:eacddd8c r5:84a15400
r4:84a15400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a15400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a72640
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a15400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0029000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r7:ddde2d40 r6:83018200 r5:8521df8c r4:84a6e080
r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d60: 800d0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:324:4263 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:324 state:D stack:0 pid:4263 tgid:4263 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eace9d84 r8:00000002 r7:60000113 r6:eace9d8c r5:84a13c00
r4:84a13c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a13c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a76700
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a13c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0f5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaccd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:850eff8c r4:850efc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:850eff8c r4:84a6e000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a13c00 r8:84a6e02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e000 r8:8027ed34 r7:eacdde60 r6:8510eb00 r5:84a13c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeace9fb0 to 0xeace9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a76480
INFO: task kworker/1:324:4263 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b343c000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.16.0-rc1-syzkaller #0
r10:829185c4 r9:eacf1d84 r8:00000002 r7:60000013 r6:eacf1d8c r5:84a12400
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a76840
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a12400 r7:00000000 r6:83018200 r5:00001000 r4:7f0f7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eace5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521c38c r4:8521c000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521c38c r4:84a6e180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a12400 r8:84a6e1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e180 r8:8027ed34 r7:eacdde60 r6:8510eb80 r5:84a12400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacf1fb0 to 0xeacf1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a76640
INFO: task kworker/1:325:4265 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b377a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
r4:dff61dc0
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:326 state:D stack:0 pid:4267 tgid:4267 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a76940
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0f9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacfb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521c78c r4:8521c400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521c78c r4:84a6e280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a16c00 r8:84a6e2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e280 r8:8027ed34 r7:eacdde60 r6:8510ec00 r5:84a16c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead05fb0 to 0xead05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a76780
INFO: task kworker/1:326:4267 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b3af0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:327 state:D stack:0 pid:4269 tgid:4269 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead11d84 r8:00000002 r7:60000113 r6:ead11d8c r5:84a10000
r4:84a10000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a10000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a76a80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a10000 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead01000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521cb8c r4:8521c800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521cb8c r4:84a6e200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a10000 r8:84a6e22c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e200 r8:8027ed34 r7:eacdde60 r6:8510ec80 r5:84a10000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead11fb0 to 0xead11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a76880
INFO: task kworker/1:327:4269 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:328:4271 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:328 state:D stack:0 pid:4271 tgid:4271 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead1dd84 r8:00000002 r7:60000013 r6:ead1dd8c r5:84a11800
r4:84a11800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a11800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a76c00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a11800 r7:00000000 r6:83018200 r5:00001000 r4:7f0fd000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead13000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521cf8c r4:8521cc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521cf8c r4:84a6e380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a11800 r8:84a6e3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xead1dfb0 to 0xead1dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:800d0013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:829185c4 r9:ead09d84 r8:00000002 r7:60000013 r6:ead09d8c r5:84a10c00
r4:84a10c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84a10c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a76d80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84a10c00 r7:00000000 r6:83018200 r5:00001000 r4:7f101000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead23000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521d38c r4:8521d000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521d38c r4:84a6e400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84a10c00 r8:84a6e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e400 r8:8027ed34 r7:eacdde60 r6:8510ed80 r5:84a10c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead09fb0 to 0xead09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a76b40
INFO: task kworker/1:329:4274 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:00000000
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:252:4277 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:252 state:D stack:0 pid:4277 tgid:4277 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaca9d84 r8:00000002 r7:60000113 r6:eaca9d8c r5:848ebc00
r4:848ebc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848ebc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a73f80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:848ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f105000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead2f000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851acb8c r4:851ac800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851acb8c r4:8510ee80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848ebc00 r8:8510eeac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510ee80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510ee80 r8:8027ed34 r7:eab5de60 r6:8510ee00 r5:848ebc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaca9fb0 to 0xeaca9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a73d80
INFO: task kworker/0:252:4277 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
r5:800d0013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:84acb38c r4:84acb000
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
r4:84b73ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:847a8000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r9:83018005 r8:847a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f109000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead57000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851ad38c r4:851ad000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851ad38c r4:8510ef00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847a8000 r8:8510ef2c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510ef00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510ef00 r8:8027ed34 r7:eaca9e60 r6:8510ef80 r5:847a8000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb9fb0 to 0xeacb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a73ec0
INFO: task kworker/0:253:4279 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b473a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace:
r5:847a8c00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a72000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df969000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521d78c r4:8521d400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521d78c r4:84a6e480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847a8c00 r8:84a6e4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e480 r8:8027ed34 r7:eacdde60 r6:85012f80 r5:847a8c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead49fb0 to 0xead49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a76cc0
INFO: task kworker/1:330:4280 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
Exception stack(0xdff61d20 to 0xdff61d68)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:dfcaf000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:254:4281 blocked for more than 468 seconds.
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a730c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:847a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f107000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead39000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851acf8c r4:851acc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851acf8c r4:84b9f000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847a9800 r8:84b9f02c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b9f000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b9f000 r8:8027ed34 r7:eacb9e60 r6:84b9f100 r5:847a9800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead3dfb0 to 0xead3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a73740
INFO: task kworker/0:254:4281 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
1d20: b4cc3000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:255 state:D stack:0 pid:4283 tgid:4283 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead55d84 r8:00000002 r7:60000113 r6:ead55d8c r5:847aa400
r4:847aa400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847aa400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497a000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:847aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa3b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851adb8c r4:851ad800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851adb8c r4:84b9f080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847aa400 r8:84b9f0ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b9f080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b9f080 r8:8027ed34 r7:eacb9e60 r6:84b9f200 r5:847aa400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead55fb0 to 0xead55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a73300
INFO: task kworker/0:255:4283 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:256:4288 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:256 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:ead69d84 r8:00000002 r7:60000113 r6:ead69d8c r5:847ab000
r5:847ab000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:851adf8c r4:851adc00
r4:84b9f180
9fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/0:256:4288 is blocked on a mutex likely owned by task kworker/1:79:3493.
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b5098000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/0:257:4290 blocked for more than 468 seconds.
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497ad40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:847abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03fb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851aeb8c r4:851ae800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851aeb8c r4:84b9f280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847abc00 r8:84b9f2ac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b9f280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b9f280 r8:8027ed34 r7:ead69e60 r6:84b9f400 r5:847abc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa45fb0 to 0xeaa45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8497a100
INFO: task kworker/0:257:4290 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:258:4292 blocked for more than 468 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:258 state:D stack:0 pid:4292 tgid:4292 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaa4dd84 r8:00000002 r7:60000113 r6:eaa4dd8c r5:847ac800
r4:847ac800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847ac800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497a3c0
r5:00001000 r4:dfd23000
r7:dddced40 r6:83018000 r5:851ae38c r4:84b9f380
r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8497a100
INFO: task kworker/0:258:4292 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b59fc000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdff61fb0 to 0xdff61ff8)
r4:84b73ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:829185c4 r9:ea8b9d84 r8:00000002 r7:60000013 r6:ea8b9d8c r5:847ad400
r4:847ad400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:847ad400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a72540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd99000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521db8c r4:8521d800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521db8c r4:84a6e300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847ad400 r8:84a6e32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e300 r8:8027ed34 r7:eacdde60 r6:84b9f500 r5:847ad400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea8b9fb0 to 0xea8b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a72500
INFO: task kworker/1:331:4293 is blocked on a mutex likely owned by task kworker/1:79:3493.
r4:00000000
r5:800d0013 r4:80239bd0
r4:dff61dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:259:4295 blocked for more than 469 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:259 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:829185c4 r9:ead71d84 r8:00000002 r7:60000113 r6:ead71d8c r5:847aec00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b9f580 r8:8027ed34 r7:eaa45e60 r6:84b9f600 r5:847aec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead71fb0 to 0xead71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8497a540
INFO: task kworker/0:259:4295 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
1d20: b5e22000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:332:4297 blocked for more than 469 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:332 state:D stack:0 pid:4297 tgid:4297 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eada1d84 r8:00000002 r7:60000113 r6:eada1d8c r5:851f8c00
r4:851f8c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada1e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:851f8c00 r8:84a6e52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b6075000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:333 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84a6e600 r8:8027ed34 r7:eada1e60 r6:84b9f700 r5:851fa400
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:333:4298 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b649a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:334:4300 blocked for more than 469 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:334 state:D stack:0 pid:4300 tgid:4300 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadb1d84 r8:00000002 r7:60000113 r6:eadb1d8c r5:851f8000
r4:851f8000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851f8000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497ab40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03cf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851ae78c r4:851ae400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:851f8000 r8:84a6e6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
r4:82abe1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:335:4301 blocked for more than 469 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:335 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadb5d84 r8:00000002 r7:60000113 r6:eadb5d8c r5:851fb000
r4:851fb000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851fb000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
5fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: b6748000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:260:4305 blocked for more than 469 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:260 state:D stack:0 pid:4305 tgid:4305 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eab19d84 r8:00000002 r7:60000113 r6:eab19d8c r5:851fbc00
r4:851fbc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851fbc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497a840
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:851fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06f5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851af38c r4:851af000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851af38c r4:84b9f900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851fbc00 r8:84b9f92c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b9f900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b9f900 r8:8027ed34 r7:ead71e60 r6:84b9f880 r5:851fbc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab19fb0 to 0xeab19ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8497ad80
INFO: task kworker/0:260:4305 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b6a58000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:851fc800 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab35e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a72d80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47bd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521eb8c r4:8521e800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521eb8c r4:84a6e700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851fc800 r8:84a6e72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e700 r8:8027ed34 r7:eadb5e60 r6:84b9f980 r5:851fc800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab35fb0 to 0xeab35ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:851fd400 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497a680
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:851fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e4787000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851af78c r4:851af400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851af78c r4:84b9fa00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851fd400 r8:84b9fa2c r7:82804d40 r6:dddced40 r5:dddced60
r4:84b9fa00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b9fa00 r8:8027ed34 r7:eab19e60 r6:84b9fb00 r5:851fd400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadb9fb0 to 0xeadb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8497af40
INFO: task kworker/0:261:4308 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b6dc5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:262:4311 blocked for more than 469 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:262 state:D stack:0 pid:4311 tgid:4311 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadbdd84 r8:00000002 r7:60000113 r6:eadbdd8c r5:851fe000
r4:851fe000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851fe000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510d740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:851fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd2f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d0f8c r4:851d0c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:851fe000 r8:84b9faac r7:82804d40 r6:dddced40 r5:dddced60
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:82abe1e4
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:263:4312 blocked for more than 469 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:263 state:D stack:0 pid:4312 tgid:4312 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadc5d84 r8:00000002 r7:60000113 r6:eadc5d8c r5:851fec00
r4:851fec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851fec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85065800
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:851fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:847d338c r4:847d3000
r10:00000000 r9:84b9fb80 r8:8027ed34 r7:eadbde60 r6:84b9fc80 r5:851fec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadc5fb0 to 0xeadc5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8497aa80
INFO: task kworker/0:263:4312 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b75dc000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:dff61dc0
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:337 state:D stack:0 pid:4314 tgid:4314 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:847ae000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a72f80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:847ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8813000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521f38c r4:8521f000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521f38c r4:84a6e800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:847ae000 r8:84a6e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e800 r8:8027ed34 r7:eadb5e60 r6:84b9fd00 r5:847ae000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadcdfb0 to 0xeadcdff8)
dfa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:337:4314 is blocked on a mutex likely owned by task kworker/1:79:3493.
1d20: b76ae000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
r4:84b73ac0
task:kworker/1:338 state:D stack:0 pid:4317 tgid:4317 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e887b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522078c r4:85220400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522078c r4:84a6e880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a1800 r8:84a6e8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e880 r8:8027ed34 r7:eadcde60 r6:84b9fd80 r5:848a1800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadddfb0 to 0xeadddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a72ec0
INFO: task kworker/1:338:4317 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b799b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:339 state:D stack:0 pid:4318 tgid:4318 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a728c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8823000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521f78c r4:8521f400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521f78c r4:84a6e780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a0000 r8:84a6e7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e780 r8:8027ed34 r7:eaddde60 r6:84b9fe00 r5:848a0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeade1fb0 to 0xeade1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a72a80
INFO: task kworker/1:339:4318 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b7cd5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:84acb38c r4:84acb000
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:340 state:D stack:0 pid:4320 tgid:4320 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a76f80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e883d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521fb8c r4:8521f800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521fb8c r4:84a6e980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a3000 r8:84a6e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6e980 r8:8027ed34 r7:eaddde60 r6:84b9fe80 r5:848a3000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeade9fb0 to 0xeade9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a72c00
INFO: task kworker/1:340:4320 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b7ebe000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadc1d84 r8:00000002 r7:60000113 r6:eadc1d8c r5:85183000
r4:85183000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85183000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fcdc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85183000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8857000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8521ff8c r4:8521fc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8521ff8c r4:84a6e900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85183000 r8:84a6e92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6e900
r10:00000000 r9:84a6e900 r8:8027ed34 r7:eaddde60 r6:84a6ea00 r5:85183000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:342:4324 blocked for more than 469 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:342 state:D stack:0 pid:4324 tgid:4324 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadedd84 r8:00000002 r7:60000113 r6:eadedd8c r5:85185400
r4:85185400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85185400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadede08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17180
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85185400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e886b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522038c r4:85220000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522038c r4:84a6ea80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85185400 r8:84a6eaac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a6ea80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a6ea80 r8:8027ed34 r7:eaddde60 r6:84a6eb00 r5:85185400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadedfb0 to 0xeadedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a72280
INFO: task kworker/1:342:4324 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b832d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
r5:84acb38c r4:84acb000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:343:4328 blocked for more than 469 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:343 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:85186000
r4:85186000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85186000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17680
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84a6eb80
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf1fb0 to 0xeadf1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b171c0
INFO: task kworker/1:343:4328 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:344:4329 blocked for more than 469 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:344 state:D stack:0 pid:4329 tgid:4329 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:85186c00
r4:85186c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85186c00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:85186c00 r8:84a6ec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b171c0
INFO: task kworker/1:344:4329 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b879b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdff61fb0 to 0xdff61ff8)
r4:84b73ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:345 state:D stack:0 pid:4330 tgid:4330 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae01d84 r8:00000002 r7:60000013 r6:eae01d8c r5:85183c00
r4:85183c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85183c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b177c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85183c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8cd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522138c r4:85221000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522138c r4:84a6ed80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:84b171c0
Workqueue: events bpf_prog_free_deferred
1d20: b8951000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:85184800 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b8cdd000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:85190000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:ea8e7000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:347:4334 is blocked on a mutex likely owned by task kworker/1:79:3493.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b8ea9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:348:4336 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:348 state:D stack:0 pid:4336 tgid:4336 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:829185c4 r9:eae09d84 r8:00000002 r7:60000113 r6:eae09d8c r5:85191800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:85016100
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:348:4336 is blocked on a mutex likely owned by task kworker/1:79:3493.
r4:00000000
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b9271000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:349:4339 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:85016080 r8:8027ed34 r7:eae09e60 r6:85016180 r5:85192400
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b9418000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:350:4342 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace:
r5:85193000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae11e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:ea963000
r7:ddde2d40 r6:83018200 r5:85222b8c r4:85016200
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b96b9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:351:4343 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:351 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae15d84 r8:00000002 r7:60000113 r6:eae15d8c r5:85193c00
r4:85193c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85193c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17f00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85193c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea949000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:8522278c r4:85222400
r7:ddde2d40 r6:83018200 r5:8522278c r4:85016280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85193c00 r8:850162ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85016280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85016280 r8:8027ed34 r7:eae11e60 r6:85016380 r5:85193c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae15fb0 to 0xeae15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b17cc0
INFO: task kworker/1:351:4343 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b9ae9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae19d84 r8:00000002 r7:60000113 r6:eae19d8c r5:85194800
r4:85194800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85194800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019240
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85194800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea97d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85222f8c r4:85222c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85222f8c r4:85016400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r4:85016400
9fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace:
r4:00000000
r5:800d0013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85195400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850193c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85195400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa57000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522338c r4:85223000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522338c r4:85016480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85195400 r8:850164ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85016480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85016480 r8:8027ed34 r7:eae19e60 r6:85016600 r5:85195400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae1dfb0 to 0xeae1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019200
INFO: task kworker/1:353:4347 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: b9cce000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r5:00001000 r4:dfcaf000
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:354:4349 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:354 state:D stack:0 pid:4349 tgid:4349 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae29d84 r8:00000002 r7:60000013 r6:eae29d8c r5:848a3c00
r4:848a3c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a3c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850197c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:85016580 r8:8027ed34 r7:eae1de60 r6:84b9ff00 r5:848a3c00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:355:4351 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:355 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae31d84 r8:00000002 r7:60000013 r6:eae31d8c r5:848a2400
r4:848a2400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a2400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa61000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522378c r4:85223400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522378c r4:85016700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a2400 r8:8501672c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85016700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85016700 r8:8027ed34 r7:eae29e60 r6:84b9ff80 r5:848a2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
1d20: ba45d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:84acb38c r4:84acb000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:356:4352 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:356 state:D stack:0 pid:4352 tgid:4352 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae21d84 r8:00000002 r7:60000113 r6:eae21d8c r5:85196000
r4:85196000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85196000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019640
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85196000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019480
INFO: task kworker/1:356:4352 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ba980000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85196c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019ac0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85196c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa91000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522878c r4:85228400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522878c r4:85016800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85196c00 r8:8501682c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85016800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85016800 r8:8027ed34 r7:eae29e60 r6:85016880 r5:85196c00
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:85019880
Workqueue: events bpf_prog_free_deferred
1d60: 800d0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:358 state:D stack:0 pid:4356 tgid:4356 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae25d84 r8:00000002 r7:60000113 r6:eae25d8c r5:85190c00
r4:85190c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85190c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850198c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85190c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa87000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522838c r4:85228000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522838c r4:85016900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85190c00 r8:8501692c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85016900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85016900 r8:8027ed34 r7:eae2de60 r6:85016980 r5:85190c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae25fb0 to 0xeae25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019880
INFO: task kworker/1:358:4356 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:359:4359 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:359 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae39d84 r8:00000002 r7:60000113 r6:eae39d8c r5:85198000
r4:85198000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85198000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019c40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85198000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaaa3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85228b8c r4:85228800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85228b8c r4:85016a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85198000 r8:85016a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85016a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85016a00 r8:8027ed34 r7:eae2de60 r6:85016b00 r5:85198000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae39fb0 to 0xeae39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019a80
INFO: task kworker/1:359:4359 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bb0ef000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:360:4361 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:360 state:D stack:0 pid:4361 tgid:4361 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:eaab5000
r10:61c88647 r9:85198c00 r8:85016aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019b80
INFO: task kworker/1:360:4361 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bb487000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:361:4363 blocked for more than 470 seconds.
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae4dd84 r8:00000002 r7:60000013 r6:eae4dd8c r5:848a6000
r4:848a6000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a6000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019f00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab03000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:848a6000 r8:85016bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85016b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85016b80 r8:8027ed34 r7:eae41e60 r6:84b63000 r5:848a6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae4dfb0 to 0xeae4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85019d00
INFO: task kworker/1:361:4363 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bb7a8000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae55d84 r8:00000002 r7:60000013 r6:eae55d8c r5:848a4800
r4:848a4800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a4800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae55e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9a280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab2d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85229b8c r4:85229800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85229b8c r4:85016d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:dff61dc0
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae59d84 r8:00000002 r7:60000113 r6:eae59d8c r5:848a6c00
r4:848a6c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a6c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9a000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab0d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522978c r4:85229400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522978c r4:85016d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a6c00 r8:85016dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85016d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85016d80 r8:8027ed34 r7:eae55e60 r6:84b63100 r5:848a6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae59fb0 to 0xeae59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9a080
INFO: task kworker/1:363:4366 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bbbaa000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
r10:829185c4 r9:eae65d84 r8:00000002 r7:60000013 r6:eae65d8c r5:851f9800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae65e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:851f9800 r8:85016e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9a1c0
INFO: task kworker/1:364:4369 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bc1b8000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:85229f8c r4:85229c00
r4:85016c80
r10:00000000 r9:85016c80 r8:8027ed34 r7:eae65e60 r6:84b63200 r5:84468000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae69fb0 to 0xeae69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9a1c0
INFO: task kworker/1:365:4371 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bc375000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:366:4373 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:366 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae71d84 r8:00000002 r7:60000113 r6:eae71d8c r5:84469800
r4:84469800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84469800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9a600
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84469800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab57000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522a78c r4:8522a400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522a78c r4:85016e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84469800 r8:85016eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85016e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85016e80 r8:8027ed34 r7:eae65e60 r6:84b63280 r5:84469800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae71fb0 to 0xeae71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9a2c0
INFO: task kworker/1:366:4373 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bc5f3000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:367:4375 blocked for more than 470 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:367 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae75d84 r8:00000002 r7:60000113 r6:eae75d8c r5:8446a400
r4:8446a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8446a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae75e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:eab69000
r5:8522ab8c r4:8522a800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:368:4377 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:368 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae79d84 r8:00000002 r7:60000113 r6:eae79d8c r5:8446b000
r4:8446b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8446b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9a940
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8446b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab75000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522af8c r4:8522ac00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522af8c r4:84a9e100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8446b000 r8:84a9e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9e100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9e100 r8:8027ed34 r7:eae75e60 r6:84b63380 r5:8446b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae79fb0 to 0xeae79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9a740
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:369:4378 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:369 state:D stack:0 pid:4378 tgid:4378 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:829185c4 r9:eae7dd84 r8:00000002 r7:60000013 r6:eae7dd8c r5:8446bc00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:8522b38c r4:8522b000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9a900
INFO: task kworker/1:369:4378 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bcf20000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
r4:82abe1e4
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:00000001
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r7:ddde2d40 r6:83018200 r5:8522b78c r4:84a9e180
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xdff61d20 to 0xdff61d68)
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:371:4384 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
Call trace:
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc1e08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
Exception stack(0xeacc1fb0 to 0xeacc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9ab40
INFO: task kworker/1:371:4384 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bd4ef000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:372:4386 blocked for more than 471 seconds.
r4:8446d400
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08
r4:00000000
r5:851aff8c r4:851afc00
5fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:373:4387 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:373 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae81d84 r8:00000002 r7:60000113 r6:eae81d8c r5:84468c00
r4:84468c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84468c00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9aec0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84468c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdad000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8522bf8c r4:8522bc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8522bf8c r4:84a9e300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84468c00 r8:84a9e32c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9e300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9e300 r8:8027ed34 r7:eacf5e60 r6:84b63580 r5:84468c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae81fb0 to 0xeae81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9ab40
INFO: task kworker/1:373:4387 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r4:00000000
1d60: 800d0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:374:4389 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:374 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae89d84 r8:00000002 r7:60000113 r6:eae89d8c r5:848a5400
r4:848a5400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:848a5400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9e080 r8:8027ed34 r7:eacf5e60 r6:84b63680 r5:848a5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae89fb0 to 0xeae89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9ae00
INFO: task kworker/1:374:4389 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bde30000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a97280
r5:8523078c r4:85230400
r4:84a9e400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9e400 r8:8027ed34 r7:eacf5e60 r6:84b63700 r5:84908000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae91fb0 to 0xeae91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9af40
INFO: task kworker/1:375:4391 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: be0af000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:376:4393 blocked for more than 471 seconds.
r4:84909800
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:85230b8c r4:84a9e480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84909800 r8:84a9e4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9e480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9e480 r8:8027ed34 r7:eacf5e60 r6:84b63780 r5:84909800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae99fb0 to 0xeae99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a97240
INFO: task kworker/1:376:4393 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: be558000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
r5:00001000 r4:dfcaf000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:377 state:D stack:0 pid:4395 tgid:4395 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaea1d84 r8:00000002 r7:60000113 r6:eaea1d8c r5:84908c00
r4:84908c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84908c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a66000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84908c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffa3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85230f8c r4:85230c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85230f8c r4:84a9e380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84908c00 r8:84a9e3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9e380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9e380 r8:8027ed34 r7:eacf5e60 r6:84b63800 r5:84908c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:378:4397 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:378 state:D stack:0 pid:4397 tgid:4397 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaea9d84 r8:00000002 r7:60000113 r6:eaea9d8c r5:8490a400
r4:8490a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8490a400 r4:829185c0
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea9e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:84a9e500
9fa0: 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:379:4399 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:379 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaeb1d84 r8:00000002 r7:60000113 r6:eaeb1d8c r5:8490b000
r4:8490b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8490b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a66340
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8490b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0487000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523178c r4:85231400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8523178c r4:84a9e600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8490b000 r8:84a9e62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9e600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeaeb1fb0 to 0xeaeb1ff8)
r4:84a66140
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:380:4401 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:380 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaeb9d84 r8:00000002 r7:60000013 r6:eaeb9d8c r5:8490bc00
r4:8490bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8490bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a66480
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8490bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04c5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85231b8c r4:85231800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85231b8c r4:84a9e680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8490bc00 r8:84a9e6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9e680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:8523238c r4:85232000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:84a66540
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bf5e9000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.16.0-rc1-syzkaller #0
r4:8490e000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec1e08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: bf9dc000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:383 state:D stack:0 pid:4408 tgid:4408 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a66a40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8490c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0759000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85232b8c r4:85232800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85232b8c r4:84a9e800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8490c800 r8:84a9e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9e800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9e800 r8:8027ed34 r7:eaebde60 r6:84b63a80 r5:8490c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaec9fb0 to 0xeaec9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a666c0
INFO: task kworker/1:383:4408 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r5:800d0013 r4:80239bd0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r5:8519bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a668c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8519bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0677000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523278c r4:85232400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8523278c r4:84a9e780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8519bc00 r8:84a9e7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9e780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9e780 r8:8027ed34 r7:eaec9e60 r6:84a9e880 r5:8519bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeb5fb0 to 0xeaeb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c003f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:dff61dc0
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:385:4412 blocked for more than 471 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84a9ea00 r8:8027ed34 r7:eaec9e60 r6:84a9e900 r5:8519c800
r4:84a66980
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:386:4413 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:386 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:8519d400
r4:8519d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8519d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a66c00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8519d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9dd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85232f8c r4:85232c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85232f8c r4:84a9eb00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8519d400 r8:84a9eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9eb00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeae3dfb0 to 0xeae3dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:387:4416 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:387 state:D stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaed1d84 r8:00000002 r7:60000013 r6:eaed1d8c r5:8519e000
r4:8519e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8519e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84a9ea80
Exception stack(0xeaed1fb0 to 0xeaed1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a66c80
INFO: task kworker/1:387:4416 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c08b5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:388:4417 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:388 state:D stack:0 pid:4417 tgid:4417 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaed5d84 r8:00000002 r7:60000013 r6:eaed5d8c r5:8519ec00
r4:8519ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8519ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a66f80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8519ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa31000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523378c r4:85233400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8523378c r4:84a9eb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8519ec00 r8:84a9ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9eb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9eb80 r8:8027ed34 r7:eaed1e60 r6:84a9ec80 r5:8519ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed5fb0 to 0xeaed5ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:dff61dc0
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:389:4420 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:389 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaee1d84 r8:00000002 r7:60000113 r6:eaee1d8c r5:8519b000
r4:8519b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8519b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f41c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8519b000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac17000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85233f8c r4:85233c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85233f8c r4:84a9ed00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8519b000 r8:84a9ed2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84a9ed00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84a9ed00 r8:8027ed34 r7:eaed1e60 r6:84a9ee00 r5:8519b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaee1fb0 to 0xeaee1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a66f40
INFO: task kworker/1:389:4420 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c11cd000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:390:4422 blocked for more than 471 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:390 state:D stack:0 pid:4422 tgid:4422 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaeddd84 r8:00000002 r7:60000113 r6:eaeddd8c r5:85199800
r4:85199800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85199800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaedde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4340
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85199800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac23000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523838c r4:85238000
r7:ddde2d40 r6:83018200 r5:8523838c r4:84a9ed80
r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f4180
INFO: task kworker/1:390:4422 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c1459000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4640
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84a9ef00 r8:8027ed34 r7:eaedde60 r6:84a9ef80 r5:8519a400
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f4280
INFO: task kworker/1:391:4425 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c1767000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
INFO: task kworker/1:392:4426 blocked for more than 471 seconds.
r10:829185c4 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:851a0000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:851a0000 r8:8511012c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110100 r8:8027ed34 r7:eaed9e60 r6:85110000 r5:851a0000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaee9fb0 to 0xeaee9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f4480
INFO: task kworker/1:392:4426 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c1986000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace:
r5:851a0c00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r9:83018205 r8:851a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac5f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523938c r4:85239000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8523938c r4:85110080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851a0c00 r8:851100ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110080 r8:8027ed34 r7:eaed9e60 r6:85110200 r5:851a0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeedfb0 to 0xeaeedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f4700
INFO: task kworker/1:393:4429 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c1cee000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r10:829185c4 r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:8446ec00
r4:8446ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8446ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850659c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8446ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac71000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:847d2f8c r4:847d2c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:847d2f8c r4:84b63b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8446ec00 r8:84b63bac r7:82804d40 r6:dddced40 r5:dddced60
r4:84b63b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b63b80 r8:8027ed34 r7:eadbde60 r6:84b63c80 r5:8446ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaef5fb0 to 0xeaef5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85065a40
INFO: task kworker/0:264:4430 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c21f6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:00000000
r5:00001000 r4:dfcaf000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4800
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac53000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85238f8c r4:85238c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85238f8c r4:85110180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848a0c00 r8:851101ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110180 r8:8027ed34 r7:eaeede60 r6:84b63c00 r5:848a0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaef9fb0 to 0xeaef9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f47c0
INFO: task kworker/1:394:4431 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r5:00001000 r4:dfcaf000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:395:4434 blocked for more than 472 seconds.
Call trace:
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84171800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac7d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523978c r4:85239400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8523978c r4:85110300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84171800 r8:8511032c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110300 r8:8027ed34 r7:eaeede60 r6:84b63d00 r5:84171800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf05fb0 to 0xeaf05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f4840
INFO: task kworker/1:395:4434 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
Exception stack(0xdff61d20 to 0xdff61d68)
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:396:4435 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:396 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:84170000
r4:84170000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84170000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4c00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84170000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac8f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85239b8c r4:85239800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c2cf1000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:265:4438 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:265 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf01d84 r8:00000002 r7:60000113 r6:eaf01d8c r5:84172400
r4:84172400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84172400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510d3c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84172400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r5:800d0013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:397:4440 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:397 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf11d84 r8:00000002 r7:60000013 r6:eaf11d8c r5:84173c00
r4:84173c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84173c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4d00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84173c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac9b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85239f8c r4:85239c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85239f8c r4:85110280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84173c00 r8:851102ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110280 r8:8027ed34 r7:eaf09e60 r6:84b63e80 r5:84173c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf11fb0 to 0xeaf11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f4b40
INFO: task kworker/1:397:4440 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
r4:82abe1e4
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:398:4442 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:398 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf19d84 r8:00000002 r7:60000113 r6:eaf19d8c r5:84175400
r4:84175400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84175400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511c240
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84175400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacfd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523b38c r4:8523b000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8523b38c r4:85110400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84175400 r8:8511042c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110400 r8:8027ed34 r7:eaf11e60 r6:84b63f80 r5:84175400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d60: 800d0013 ffffffff
r4:dff61dc0
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:399:4443 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:399 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf1dd84 r8:00000002 r7:60000113 r6:eaf1dd8c r5:84176000
r4:84176000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84176000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf1de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4e40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84176000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacad000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523a38c r4:8523a000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8523a38c r4:85110500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xeaf1dfb0 to 0xeaf1dff8)
r4:850f4e00
Workqueue: events bpf_prog_free_deferred
r5:800d0013 r4:80239bd0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:400:4445 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:400 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaef1d84 r8:00000002 r7:60000013 r6:eaef1d8c r5:851a1800
r4:851a1800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851a1800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4fc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r5:00001000 r4:eacc5000
r5:8523a78c r4:8523a400
r4:85110580
Exception stack(0xeaef1fb0 to 0xeaef1ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:401:4448 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:401 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf25d84 r8:00000002 r7:60000113 r6:eaf25d8c r5:851a3000
r4:851a3000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851a3000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf25e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:eaccf000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
5fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:800d0013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:402:4449 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:402 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaee5d84 r8:00000002 r7:60000113 r6:eaee5d8c r5:851a3c00
r4:851a3c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851a3c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511c000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eace3000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d60: 800d0013 ffffffff
r4:dff61dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:403:4451 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:403 state:D stack:0 pid:4451 tgid:4451 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf29d84 r8:00000002 r7:60000013 r6:eaf29d8c r5:851a5400
r4:851a5400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851a5400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf29e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511c740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead27000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523bb8c r4:8523b800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8523bb8c r4:85110800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851a5400 r8:8511082c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110800 r8:8027ed34 r7:eaf19e60 r6:85110880 r5:851a5400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8511c180
INFO: task kworker/1:403:4451 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c443a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:266:4454 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:266 state:D stack:0 pid:4454 tgid:4454 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf31d84 r8:00000002 r7:60000113 r6:eaf31d8c r5:851a6000
r4:851a6000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851a6000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510d600
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:851a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfaa9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d0b8c r4:851d0800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d0b8c r4:8510c080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851a6000 r8:8510c0ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c080 r8:8027ed34 r7:eadbde60 r6:85110900 r5:851a6000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf31fb0 to 0xeaf31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8510d300
INFO: task kworker/0:266:4454 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c4887000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:404:4456 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:404 state:D stack:0 pid:4456 tgid:4456 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:851a2400
r4:851a2400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851a2400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a63e40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:851a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9c1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8524578c r4:85245400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8524578c r4:85110a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851a2400 r8:85110a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110a00 r8:8027ed34 r7:eaf29e60 r6:85110a80 r5:851a2400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf35fb0 to 0xeaf35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8511c440
INFO: task kworker/1:404:4456 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c4b9e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:267:4461 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:267 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae45d84 r8:00000002 r7:60000013 r6:eae45d8c r5:85158c00
r4:85158c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85158c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510da00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85158c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00a7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d178c r4:851d1400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d178c r4:8510c180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85158c00 r8:8510c1ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c180 r8:8027ed34 r7:eadbde60 r6:85110980 r5:85158c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae45fb0 to 0xeae45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8510d780
INFO: task kworker/0:267:4461 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c5012000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:268:4463 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:268 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eae5dd84 r8:00000002 r7:60000013 r6:eae5dd8c r5:85159800
r4:85159800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85159800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510d8c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85159800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0017000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d138c r4:851d1000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d138c r4:8510c200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85159800 r8:8510c22c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c200 r8:8027ed34 r7:eae45e60 r6:85110b00 r5:85159800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae5dfb0 to 0xeae5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8510d900
INFO: task kworker/0:268:4463 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c5012000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:405:4464 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:405 state:D stack:0 pid:4464 tgid:4464 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf3dd84 r8:00000002 r7:60000113 r6:eaf3dd8c r5:8515a400
r4:8515a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8515a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf3de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511ce80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8515a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e043f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523bf8c r4:8523bc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8523bf8c r4:85110b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8515a400 r8:85110bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110b80 r8:8027ed34 r7:eaf29e60 r6:85110c00 r5:8515a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf3dfb0 to 0xeaf3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8511ca80
INFO: task kworker/1:405:4464 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c536b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:406:4465 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:406 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf41d84 r8:00000002 r7:60000113 r6:eaf41d8c r5:8515b000
r4:8515b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8515b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85116bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8515b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab05000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85244f8c r4:85244c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85244f8c r4:85110c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8515b000 r8:85110cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110c80 r8:8027ed34 r7:eaf3de60 r6:85110d00 r5:8515b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf41fb0 to 0xeaf41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8511ca80
INFO: task kworker/1:406:4465 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c57be000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
r4:8515bc00
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510db00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8515bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03f3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d1b8c r4:851d1800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d1b8c r4:8510c280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8515bc00 r8:8510c2ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c280 r8:8027ed34 r7:eae45e60 r6:85110d80 r5:8515bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf45fb0 to 0xeaf45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8510dac0
INFO: task kworker/0:269:4467 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c5fb3000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:270:4469 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:270 state:D stack:0 pid:4469 tgid:4469 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf39d84 r8:00000002 r7:60000013 r6:eaf39d8c r5:84173000
r4:84173000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84173000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510dfc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84173000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8815000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d238c r4:851d2000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d238c r4:8510c100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84173000 r8:8510c12c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c100 r8:8027ed34 r7:eaf45e60 r6:8510c300 r5:84173000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf39fb0 to 0xeaf39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8510dac0
INFO: task kworker/0:270:4469 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c63cb000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
r5:84acb38c r4:84acb000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:271:4470 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:271 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eadf5d84 r8:00000002 r7:60000113 r6:eadf5d8c r5:8515c800
r4:8515c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8515c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510de00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8515c800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47b3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d1f8c r4:851d1c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d1f8c r4:8510c380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8515c800 r8:8510c3ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c380 r8:8027ed34 r7:eaf39e60 r6:85110e00 r5:8515c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf5fb0 to 0xeadf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8510d880
INFO: task kworker/0:271:4470 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c6687000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:407:4472 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:407 state:D stack:0 pid:4472 tgid:4472 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf49d84 r8:00000002 r7:60000013 r6:eaf49d8c r5:8515d400
r4:8515d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8515d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf49e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511c900
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:8515d400 r8:85110f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xeaf49fb0 to 0xeaf49ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8511cdc0
INFO: task kworker/1:407:4472 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c6cb6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:408:4474 blocked for more than 472 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:408 state:D stack:0 pid:4474 tgid:4474 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf2dd84 r8:00000002 r7:60000113 r6:eaf2dd8c r5:8515e000
r4:8515e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8515e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf2de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85116000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8515e000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47cf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8524478c r4:85244400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8524478c r4:85110f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8515e000 r8:85110fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85110f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85110f80 r8:8027ed34 r7:eaf41e60 r6:8506bf80 r5:8515e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf2dfb0 to 0xeaf2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:409:4477 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:409 state:D stack:0 pid:4477 tgid:4477 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf4dd84 r8:00000002 r7:60000113 r6:eaf4dd8c r5:8515ec00
r4:8515ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8515ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85116fc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8515ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea95d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d438c r4:851d4000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:851d438c r4:85117100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8515ec00 r8:8511712c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117100 r8:8027ed34 r7:eaf41e60 r6:85117080 r5:8515ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf4dfb0 to 0xeaf4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85116080
INFO: task kworker/1:409:4477 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c71e6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:272:4479 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:272 state:D stack:0 pid:4479 tgid:4479 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf59d84 r8:00000002 r7:60000113 r6:eaf59d8c r5:851a6c00
r4:851a6c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851a6c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510d280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:851a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e882d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d278c r4:851d2400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d278c r4:8510c400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851a6c00 r8:8510c42c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c400 r8:8027ed34 r7:eaf39e60 r6:85117000 r5:851a6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf59fb0 to 0xeaf59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8510df00
INFO: task kworker/0:272:4479 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c7b53000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r5:85260000 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510d0c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85260000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e885d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d2b8c r4:851d2800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d2b8c r4:8510c500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85260000 r8:8510c52c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c500 r8:8027ed34 r7:eaf59e60 r6:85117180 r5:85260000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf61fb0 to 0xeaf61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8510ddc0
INFO: task kworker/0:273:4481 is blocked on a mutex likely owned by task kworker/1:79:3493.
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c7b53000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced40 r6:83018000 r5:851d4b8c r4:8510c480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:275:4485 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:275 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf71d84 r8:00000002 r7:60000113 r6:eaf71d8c r5:85263000
r4:85263000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85263000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85108000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85263000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fa0: 00000000 00000000 00000000 00000000
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.16.0-rc1-syzkaller #0
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf79d84 r8:00000002 r7:60000113 r6:eaf79d8c r5:85260c00
r4:85260c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85260c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85108240
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85260c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8a9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d338c r4:851d3000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d338c r4:8510c600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85260c00 r8:8510c62c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c600 r8:8027ed34 r7:eaf69e60 r6:85117300 r5:85260c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf79fb0 to 0xeaf79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85108200
INFO: task kworker/0:276:4487 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c87db000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:277:4489 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:277 state:D stack:0 pid:4489 tgid:4489 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf81d84 r8:00000002 r7:60000013 r6:eaf81d8c r5:85264800
r4:85264800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85264800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf81e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85108400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85264800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8c7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d378c r4:851d3400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d378c r4:8510c700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85264800 r8:8510c72c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c700 r8:8027ed34 r7:eaf69e60 r6:85117380 r5:85264800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf81fb0 to 0xeaf81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85108180
INFO: task kworker/0:277:4489 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c8aeb000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf85d84 r8:00000002 r7:60000013 r6:eaf85d8c r5:85263c00
r4:85263c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85263c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85108340
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85263c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8f1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d3b8c r4:851d3800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d3b8c r4:8510c780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85263c00 r8:8510c7ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c780 r8:8027ed34 r7:eaf69e60 r6:85117400 r5:85263c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf85fb0 to 0xeaf85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85108340
INFO: task kworker/0:278:4490 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r5:800d0013 r4:80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:279:4492 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:279 state:D stack:0 pid:4492 tgid:4492 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf8dd84 r8:00000002 r7:60000013 r6:eaf8dd8c r5:85262400
r4:85262400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85262400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85108640
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85262400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea90b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d3f8c r4:851d3c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d3f8c r4:8510c680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85262400 r8:8510c6ac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c680 r8:8027ed34 r7:eaf69e60 r6:85117480 r5:85262400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf8dfb0 to 0xeaf8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85108480
INFO: task kworker/0:279:4492 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c90b4000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:280:4494 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:280 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:829185c4 r9:eaf95d84 r8:00000002 r7:60000113 r6:eaf95d8c r5:85265400
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08
r4:00000000
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced40 r6:83018000 r5:847d378c r4:8510c880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: c931f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:281:4496 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:281 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf9dd84 r8:00000002 r7:60000113 r6:eaf9dd8c r5:85266000
r4:85266000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85266000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85108a40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85266000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa4f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d478c r4:851d4400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d478c r4:8510c980
r4:8510c980
Exception stack(0xeaf9dfb0 to 0xeaf9dff8)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:410:4498 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:410 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafa1d84 r8:00000002 r7:60000113 r6:eafa1d8c r5:85266c00
r4:85266c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85266c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85116e00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85266c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaab3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85244b8c r4:85244800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85244b8c r4:85117600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85266c00 r8:8511762c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117600 r8:8027ed34 r7:eaf41e60 r6:85117680 r5:85266c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa1fb0 to 0xeafa1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:85116e80
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:282:4501 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:282 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafadd84 r8:00000002 r7:60000113 r6:eafadd8c r5:85258c00
r4:85258c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85258c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85108c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85258c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa71000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d4f8c r4:851d4c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d4f8c r4:8510c900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85258c00 r8:8510c92c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510c900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510c900 r8:8027ed34 r7:eaf69e60 r6:85117700 r5:85258c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafadfb0 to 0xeafadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85108980
INFO: task kworker/0:282:4501 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ca1ee000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:283:4502 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:283 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafb1d84 r8:00000002 r7:60000113 r6:eafb1d8c r5:85259800
r4:85259800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85259800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85108e40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85259800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa81000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d538c r4:851d5000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d538c r4:8510ca80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85259800 r8:8510caac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510ca80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510ca80 r8:8027ed34 r7:eafade60 r6:85117780 r5:85259800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb1fb0 to 0xeafb1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85108bc0
INFO: task kworker/0:283:4502 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ca4e6000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:284:4505 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:284 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafb5d84 r8:00000002 r7:60000013 r6:eafb5d8c r5:8525a400
r4:8525a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8525a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85108840
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8525a400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa97000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d578c r4:851d5400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d578c r4:8510cb80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8525a400 r8:8510cbac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510cb80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510cb80 r8:8027ed34 r7:eafb1e60 r6:85117800 r5:8525a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb5fb0 to 0xeafb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85108d80
INFO: task kworker/0:284:4505 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: caaae000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r5:84acb38c r4:84acb000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:285 state:D stack:0 pid:4507 tgid:4507 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafa9d84 r8:00000002 r7:60000113 r6:eafa9d8c r5:84174800
r4:84174800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84174800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fe040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84174800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab21000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d5b8c r4:851d5800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d5b8c r4:8510cc00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84174800 r8:8510cc2c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510cc00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510cc00 r8:8027ed34 r7:eafb5e60 r6:8510cc80 r5:84174800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa9fb0 to 0xeafa9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85108f40
INFO: task kworker/0:285:4507 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cadda000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:411:4510 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:411 state:D stack:0 pid:4510 tgid:4510 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafbdd84 r8:00000002 r7:60000013 r6:eafbdd8c r5:84176c00
r4:84176c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84176c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a63580
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84176c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff45000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8524638c r4:85246000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8524638c r4:85117880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84176c00 r8:851178ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117880 r8:8027ed34 r7:eaf41e60 r6:8510cb00 r5:84176c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafbdfb0 to 0xeafbdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85116e40
INFO: task kworker/1:411:4510 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cb21f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:412:4512 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:412 state:D stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:84170c00
r4:84170c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84170c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a63d80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84170c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb025000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8524538c r4:85245000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8524538c r4:85117900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84170c00 r8:8511792c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117900 r8:8027ed34 r7:eafbde60 r6:8510cd00 r5:84170c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb9fb0 to 0xeafb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85108fc0
INFO: task kworker/1:412:4512 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cb578000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:286:4513 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:286 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:85128000
r4:85128000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85128000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fe300
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85128000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab41000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d5f8c r4:851d5c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d5f8c r4:8510ce00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85128000 r8:8510ce2c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510ce00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510ce00 r8:8027ed34 r7:eafa9e60 r6:8510cd80 r5:85128000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc1fb0 to 0xeafc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fe0c0
INFO: task kworker/0:286:4513 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cb8f3000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:287 state:D stack:0 pid:4515 tgid:4515 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fe480
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85128c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab55000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d638c r4:851d6000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d638c r4:8510ce80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85128c00 r8:8510ceac r7:82804d40 r6:dddced40 r5:dddced60
r4:8510ce80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510ce80 r8:8027ed34 r7:eafc1e60 r6:8510cf80 r5:85128c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf51fb0 to 0xeaf51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fe2c0
INFO: task kworker/0:287:4515 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cbc43000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:288:4517 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:288 state:D stack:0 pid:4517 tgid:4517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaf55d84 r8:00000002 r7:60000113 r6:eaf55d8c r5:85129800
r4:85129800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85129800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850feac0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85129800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead59000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:8510ca00
Exception stack(0xeaf55fb0 to 0xeaf55ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
r5:800d0013 r4:80239bd0
r4:dff61dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:289:4519 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:289 state:D stack:0 pid:4519 tgid:4519 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafc5d84 r8:00000002 r7:60000113 r6:eafc5d8c r5:8512a400
r4:8512a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8512a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fe5c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8512a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab6b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d678c r4:851d6400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d678c r4:8510cf00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8512a400 r8:8510cf2c r7:82804d40 r6:dddced40 r5:dddced60
r4:8510cf00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8510cf00 r8:8027ed34 r7:eaf55e60 r6:85077000 r5:8512a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc5fb0 to 0xeafc5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fe500
INFO: task kworker/0:289:4519 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cc512000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/0:290 state:D stack:0 pid:4521 tgid:4521 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:8512b000
r4:8512b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8512b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fe7c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8512b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab7f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d6b8c r4:851d6800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d6b8c r4:85077080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8512b000 r8:850770ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85077080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077080 r8:8027ed34 r7:eaf55e60 r6:85077180 r5:8512b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc9fb0 to 0xeafc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fe700
INFO: task kworker/0:290:4521 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cc897000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:291:4522 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:291 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:8512bc00
r4:8512bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8512bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fe900
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8512bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead37000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d6f8c r4:851d6c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xeafcdfb0 to 0xeafcdff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cca30000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:292:4525 blocked for more than 473 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:292 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:8512c800
r5:8512c800 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:8512c800 r8:8507722c r7:82804d40 r6:dddced40 r5:dddced60
1fa0: 00000000 00000000 00000000 00000000
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ccd57000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:293:4527 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:293 state:D stack:0 pid:4527 tgid:4527 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafd5d84 r8:00000002 r7:60000113 r6:eafd5d8c r5:8512d400
r4:8512d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8512d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fec00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8512d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead73000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d778c r4:851d7400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d778c r4:85077300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:85077300 r8:8027ed34 r7:eafd1e60 r6:85077400 r5:8512d400
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:294:4529 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:294 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafd9d84 r8:00000002 r7:60000013 r6:eafd9d8c r5:8512e000
r4:8512e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8512e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fef00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8512e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead8d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:851d7f8c r4:851d7c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:851d7f8c r4:85077480
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8512e000 r8:850774ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85077480
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077480 r8:8027ed34 r7:eafd1e60 r6:85077500 r5:8512e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafd9fb0 to 0xeafd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fec80
INFO: task kworker/0:294:4529 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cd296000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:295:4531 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:295 state:D stack:0 pid:4531 tgid:4531 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafddd84 r8:00000002 r7:60000113 r6:eafddd8c r5:8512ec00
r4:8512ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8512ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851088c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8512ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadd7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8516438c r4:85164000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8516438c r4:85077580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8512ec00 r8:850775ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85077580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077580 r8:8027ed34 r7:eafd9e60 r6:85077600 r5:8512ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafddfb0 to 0xeafddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fee40
INFO: task kworker/0:295:4531 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cd776000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:296:4533 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:296 state:D stack:0 pid:4533 tgid:4533 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:83b48000
r4:83b48000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b48000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9f2c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83b48000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae33000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85164b8c r4:85164800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85164b8c r4:85077680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b48000 r8:850776ac r7:82804d40 r6:dddced40 r5:dddced60
r4:85077680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077680 r8:8027ed34 r7:eafdde60 r6:85077700 r5:83b48000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe1fb0 to 0xeafe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850fee40
INFO: task kworker/0:296:4533 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:297:4534 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:297 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafe9d84 r8:00000002 r7:60000013 r6:eafe9d8c r5:83b48c00
r4:83b48c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b48c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9f040
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:61c88647 r9:83b48c00 r8:850777ac r7:82804d40 r6:dddced40 r5:dddced60
9fa0: 00000000 00000000 00000000 00000000
r4:84a9f080
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
r4:82abe1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:298:4537 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:298 state:D stack:0 pid:4537 tgid:4537 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafe5d84 r8:00000002 r7:60000113 r6:eafe5d8c r5:83b49800
r4:83b49800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b49800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9f440
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83b49800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae49000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85164f8c r4:85164c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85164f8c r4:85077800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b49800 r8:8507782c r7:82804d40 r6:dddced40 r5:dddced60
r4:85077800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077800 r8:8027ed34 r7:eafe1e60 r6:85077980 r5:83b49800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe5fb0 to 0xeafe5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9f200
INFO: task kworker/0:298:4537 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ce0b2000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:299:4539 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:299 state:D stack:0 pid:4539 tgid:4539 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:83b4a400
r4:83b4a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b4a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9f780
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83b4a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaffd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8516578c r4:85165400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8516578c r4:85077900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b4a400 r8:8507792c r7:82804d40 r6:dddced40 r5:dddced60
r4:85077900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077900 r8:8027ed34 r7:eafe5e60 r6:85077a80 r5:83b4a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaff1fb0 to 0xeaff1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9f400
INFO: task kworker/0:299:4539 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ce593000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:300:4540 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:300 state:D stack:0 pid:4540 tgid:4540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:83b4b000
r4:83b4b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b4b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9f680
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83b4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaff7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8516538c r4:85165000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8516538c r4:85077a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b4b000 r8:85077a2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85077a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077a00 r8:8027ed34 r7:eaff1e60 r6:85077b00 r5:83b4b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafedfb0 to 0xeafedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9f400
INFO: task kworker/0:300:4540 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ce593000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:301:4543 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:301 state:D stack:0 pid:4543 tgid:4543 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eaff5d84 r8:00000002 r7:60000113 r6:eaff5d8c r5:83b4bc00
r4:83b4bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b4bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9f8c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83b4bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb00b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85165b8c r4:85165800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85165b8c r4:85077b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b4bc00 r8:85077bac r7:82804d40 r6:dddced40 r5:dddced60
r4:85077b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077b80 r8:8027ed34 r7:eaff1e60 r6:85077c00 r5:83b4bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaff5fb0 to 0xeaff5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9f6c0
INFO: task kworker/0:301:4543 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cea27000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:302:4544 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:302 state:D stack:0 pid:4544 tgid:4544 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb001d84 r8:00000002 r7:60000113 r6:eb001d8c r5:83b4c800
r4:83b4c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b4c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9fa40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83b4c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb011000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85165f8c r4:85165c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85165f8c r4:85077c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b4c800 r8:85077cac r7:82804d40 r6:dddced40 r5:dddced60
r4:85077c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077c80 r8:8027ed34 r7:eaff5e60 r6:85077d80 r5:83b4c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb001fb0 to 0xeb001ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9f880
INFO: task kworker/0:302:4544 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ced5b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:303:4547 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:303 state:D stack:0 pid:4547 tgid:4547 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:83b4d400
r4:83b4d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b4d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9fc40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83b4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb01f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8516638c r4:85166000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8516638c r4:85077d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b4d400 r8:85077d2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85077d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077d00 r8:8027ed34 r7:eb001e60 r6:85077e80 r5:83b4d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb009fb0 to 0xeb009ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9f980
INFO: task kworker/0:303:4547 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cefcf000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:304:4548 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:304 state:D stack:0 pid:4548 tgid:4548 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb015d84 r8:00000002 r7:60000113 r6:eb015d8c r5:83b4e000
r4:83b4e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:83b4e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719000
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:83b4e000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe51000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8516678c r4:85166400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:8516678c r4:85077e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:83b4e000 r8:85077e2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85077e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85077e00 r8:8027ed34 r7:eb009e60 r6:84790000 r5:83b4e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb015fb0 to 0xeb015ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9f980
INFO: task kworker/0:304:4548 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cf07f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:305:4550 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:305 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb031d84 r8:00000002 r7:60000113 r6:eb031d8c r5:85140000
r4:85140000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85140000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a63f40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85140000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbd3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85245b8c r4:85245800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85245b8c r4:84790100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85140000 r8:8479012c r7:82804d40 r6:dddced40 r5:dddced60
r4:84790100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84790100 r8:8027ed34 r7:eb015e60 r6:84790080 r5:85140000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb031fb0 to 0xeb031ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9f980
INFO: task kworker/0:305:4550 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cf476000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:413:4553 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:413 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb035d84 r8:00000002 r7:60000113 r6:eb035d8c r5:85141800
r4:85141800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85141800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a63ac0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85141800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcc1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85245f8c r4:85245c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85245f8c r4:85117980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85141800 r8:851179ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117980 r8:8027ed34 r7:eafbde60 r6:84790180 r5:85141800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb035fb0 to 0xeb035ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a63f00
INFO: task kworker/1:413:4553 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cf4ea000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:306:4555 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:306 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb03dd84 r8:00000002 r7:60000113 r6:eb03dd8c r5:85140c00
r4:85140c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85140c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85140c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf5d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b0b8c r4:852b0800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b0b8c r4:84790200
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85140c00 r8:8479022c r7:82804d40 r6:dddced40 r5:dddced60
r4:84790200
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84790200 r8:8027ed34 r7:eb015e60 r6:84790280 r5:85140c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb03dfb0 to 0xeb03dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a9fe00
INFO: task kworker/0:306:4555 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cf860000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:307:4558 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:307 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb029d84 r8:00000002 r7:60000113 r6:eb029d8c r5:85143000
r4:85143000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85143000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719e80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85143000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac69000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85166b8c r4:85166800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85166b8c r4:84790300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85143000 r8:8479032c r7:82804d40 r6:dddced40 r5:dddced60
r4:84790300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84790300 r8:8027ed34 r7:eb03de60 r6:84790400 r5:85143000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb029fb0 to 0xeb029ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84719080
INFO: task kworker/0:307:4558 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cfc3e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:414:4559 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:414 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:85143c00
r4:85143c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85143c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a631c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85143c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffad000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8524678c r4:85246400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8524678c r4:85117a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85143c00 r8:85117aac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117a80 r8:8027ed34 r7:eafbde60 r6:84790380 r5:85143c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb041fb0 to 0xeb041ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a63e80
INFO: task kworker/1:414:4559 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cfc3e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:415:4562 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:415 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb049d84 r8:00000002 r7:60000113 r6:eb049d8c r5:85145400
r4:85145400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85145400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f640
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85145400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9f5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85247f8c r4:85247c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85247f8c r4:85117a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85145400 r8:85117a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117a00 r8:8027ed34 r7:eb041e60 r6:84790480 r5:85145400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb049fb0 to 0xeb049ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a63400
INFO: task kworker/1:415:4562 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: cff10000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:416:4564 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:416 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:85146c00
r4:85146c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85146c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511c500
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85146c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e046b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85246b8c r4:85246800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85246b8c r4:85117b80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85146c00 r8:85117bac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117b80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117b80 r8:8027ed34 r7:eb049e60 r6:84790500 r5:85146c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb059fb0 to 0xeb059ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8511c400
INFO: task kworker/1:416:4564 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d019c000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:417:4565 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:417 state:D stack:0 pid:4565 tgid:4565 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb05dd84 r8:00000002 r7:60000113 r6:eb05dd8c r5:85144800
r4:85144800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85144800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f140
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85144800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04dd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85246f8c r4:85246c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85246f8c r4:85117c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85144800 r8:85117c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117c00 r8:8027ed34 r7:eb049e60 r6:84790580 r5:85144800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb05dfb0 to 0xeb05dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8511c400
INFO: task kworker/1:417:4565 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d038b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:418:4568 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:418 state:D stack:0 pid:4568 tgid:4568 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:85146000
r4:85146000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85146000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85146000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e055f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8524738c r4:85247000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8524738c r4:85117b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85146000 r8:85117b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117b00 r8:8027ed34 r7:eb049e60 r6:84790600 r5:85146000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb069fb0 to 0xeb069ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8f080
INFO: task kworker/1:418:4568 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d06be000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:419:4570 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:419 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb071d84 r8:00000002 r7:60000113 r6:eb071d8c r5:84810c00
r4:84810c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84810c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84810c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0663000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8524778c r4:85247400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8524778c r4:85117c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84810c00 r8:85117cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117c80 r8:8027ed34 r7:eb049e60 r6:84790680 r5:84810c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb071fb0 to 0xeb071ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8f1c0
INFO: task kworker/1:419:4570 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d092b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:420:4571 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:420 state:D stack:0 pid:4571 tgid:4571 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb039d84 r8:00000002 r7:60000013 r6:eb039d8c r5:8525bc00
r4:8525bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8525bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8525bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e071b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85247b8c r4:85247800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85247b8c r4:85117d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8525bc00 r8:85117dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117d80 r8:8027ed34 r7:eb049e60 r6:85117e00 r5:8525bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb039fb0 to 0xeb039ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8f340
INFO: task kworker/1:420:4571 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d0c67000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:421:4574 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:421 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb06dd84 r8:00000002 r7:60000113 r6:eb06dd8c r5:8525d400
r4:8525d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8525d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f980
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8525d400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabff000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8525038c r4:85250000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8525038c r4:85117d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8525d400 r8:85117d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117d00 r8:8027ed34 r7:eb049e60 r6:85117f00 r5:8525d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb06dfb0 to 0xeb06dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8f580
INFO: task kworker/1:421:4574 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d0cd1000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:422:4575 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:422 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb01dd84 r8:00000002 r7:60000113 r6:eb01dd8c r5:8525e000
r4:8525e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8525e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f840
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8525e000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa2f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8523b78c r4:8523b400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8523b78c r4:85117e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8525e000 r8:85117eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85117e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85117e80 r8:8027ed34 r7:eb06de60 r6:85117f80 r5:8525e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb01dfb0 to 0xeb01dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8f580
INFO: task kworker/1:422:4575 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d0f8d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:423:4578 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:423 state:D stack:0 pid:4578 tgid:4578 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:8525ec00
r4:8525ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8525ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8fac0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8525ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac0f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8525078c r4:85250400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8525078c r4:84b55100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8525ec00 r8:84b5512c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55100 r8:8027ed34 r7:eb06de60 r6:84b55000 r5:8525ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb079fb0 to 0xeb079ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8f8c0
INFO: task kworker/1:423:4578 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d1255000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:424:4580 blocked for more than 474 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:424 state:D stack:0 pid:4580 tgid:4580 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb081d84 r8:00000002 r7:60000113 r6:eb081d8c r5:8525c800
r4:8525c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8525c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8fc40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8525c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac2b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85250b8c r4:85250800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85250b8c r4:84b55080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8525c800 r8:84b550ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55080
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55080 r8:8027ed34 r7:eb079e60 r6:84b55200 r5:8525c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb081fb0 to 0xeb081ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8fa00
INFO: task kworker/1:424:4580 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d1551000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:425:4582 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:425 state:D stack:0 pid:4582 tgid:4582 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb085d84 r8:00000002 r7:60000113 r6:eb085d8c r5:8525b000
r4:8525b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8525b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb085e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8fd80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8525b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac3f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85250f8c r4:85250c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85250f8c r4:84b55180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8525b000 r8:84b551ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55180 r8:8027ed34 r7:eb081e60 r6:84b55280 r5:8525b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb085fb0 to 0xeb085ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8fb80
INFO: task kworker/1:425:4582 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d1981000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:426:4584 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:426 state:D stack:0 pid:4584 tgid:4584 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb089d84 r8:00000002 r7:60000013 r6:eb089d8c r5:85258000
r4:85258000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85258000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8ff00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85258000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac55000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8525138c r4:85251000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8525138c r4:84b55300
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85258000 r8:84b5532c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55300
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55300 r8:8027ed34 r7:eb085e60 r6:84b55400 r5:85258000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb089fb0 to 0xeb089ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8fcc0
INFO: task kworker/1:426:4584 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d1b18000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:427:4585 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:427 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb07dd84 r8:00000002 r7:60000113 r6:eb07dd8c r5:85158000
r4:85158000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85158000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67440
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85158000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac99000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85251b8c r4:85251800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85251b8c r4:84b55380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85158000 r8:84b553ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55380 r8:8027ed34 r7:eb089e60 r6:84b55480 r5:85158000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb07dfb0 to 0xeb07dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b8fe40
INFO: task kworker/1:427:4585 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d1ddc000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:308:4588 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:308 state:D stack:0 pid:4588 tgid:4588 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb09dd84 r8:00000002 r7:60000113 r6:eb09dd8c r5:8490ec00
r4:8490ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8490ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8490ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead25000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85166f8c r4:85166c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85166f8c r4:84790700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8490ec00 r8:8479072c r7:82804d40 r6:dddced40 r5:dddced60
r4:84790700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84790700 r8:8027ed34 r7:eb03de60 r6:84b55500 r5:8490ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb09dfb0 to 0xeb09dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84719f40
INFO: task kworker/0:308:4588 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d2084000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:428:4589 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:428 state:D stack:0 pid:4589 tgid:4589 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb0a1d84 r8:00000002 r7:60000013 r6:eb0a1d8c r5:85268000
r4:85268000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85268000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67380
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85268000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d20: d2413000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:84b73ac0
INFO: task kworker/1:429:4592 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:429 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:84813000
r4:84813000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84813000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a675c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84813000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85251f8c r4:85251c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85251f8c r4:84b55600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84813000 r8:84b5562c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55600 r8:8027ed34 r7:eb07de60 r6:84790780 r5:84813000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0a9fb0 to 0xeb0a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a67340
INFO: task kworker/1:429:4592 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d274f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:430 state:D stack:0 pid:4593 tgid:4593 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08
r4:00000000
r5:8525238c r4:85252000
r7:ddde2d40 r6:83018200 r5:8525238c r4:84b55680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84810000 r8:84b556ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55680 r8:8027ed34 r7:eb0a9e60 r6:84790880 r5:84810000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0adfb0 to 0xeb0adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a67340
INFO: task kworker/1:430:4593 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d2a93000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:431:4595 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:431 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb0b5d84 r8:00000002 r7:60000113 r6:eb0b5d8c r5:84812400
r4:84812400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84812400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67940
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84812400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacf9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85252b8c r4:85252800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85252b8c r4:84b55800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84812400 r8:84b5582c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55800 r8:8027ed34 r7:eb0ade60 r6:84790900 r5:84812400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b5fb0 to 0xeb0b5ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d60: 800d0013 ffffffff
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:432 state:D stack:0 pid:4597 tgid:4597 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:eaceb000
r7:ddde2d40 r6:83018200 r5:8525278c r4:84b55780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84813c00 r8:84b557ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55780 r8:8027ed34 r7:eb0b5e60 r6:84790980 r5:84813c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0bdfb0 to 0xeb0bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a677c0
INFO: task kworker/1:432:4597 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d314d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:433 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:84814800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84814800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67ec0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84814800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae8b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85253b8c r4:85253800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85253b8c r4:84b55700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xeb0d5fb0 to 0xeb0d5ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdff61fb0 to 0xdff61ff8)
r4:84b73ac0
task:kworker/1:434 state:D stack:0 pid:4601 tgid:4601 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84815400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead15000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85252f8c r4:85252c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:85252f8c r4:84b55880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84815400 r8:84b558ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55880 r8:8027ed34 r7:eb0d5e60 r6:84790a80 r5:84815400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0ddfb0 to 0xeb0ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a679c0
INFO: task kworker/1:434:4601 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r4:00000000
r4:82abe1e4
r4:00000000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:829185c4 r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:84816000
r4:84816000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84816000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67c00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84816000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae4f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:8525338c r4:85253000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:8525338c r4:84b55980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84816000 r8:84b559ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55980 r8:8027ed34 r7:eb0d5e60 r6:84790b00 r5:84816000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e5fb0 to 0xeb0e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
1d60: 800d0013 ffffffff
r4:dff61dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:309:4605 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:309 state:D stack:0 pid:4605 tgid:4605 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:84816c00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r5:00001000 r4:eaf1f000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d3cfb000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeb10dfb0 to 0xeb10dff8)
r4:84a67b40
Call trace:
1d20: d3cfb000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:437:4610 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:437 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb111d84 r8:00000002 r7:60000113 r6:eb111d8c r5:84811800
r4:84811800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84811800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84b55a80
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: d4215000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:00000000
r5:84acb38c r4:84acb000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:438:4612 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:438 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb119d84 r8:00000002 r7:60000013 r6:eb119d8c r5:85148000
r4:85148000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85148000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85148000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaefb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d0b8c r4:852d0800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d0b8c r4:84b55900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85148000 r8:84b5592c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55900 r8:8027ed34 r7:eb111e60 r6:84790d80 r5:85148000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb119fb0 to 0xeb119ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a67f40
INFO: task kworker/1:438:4612 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d43e8000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:84b55b80 r8:8027ed34 r7:eb119e60 r6:84790e00 r5:85148c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb11dfb0 to 0xeb11dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84a67f40
INFO: task kworker/1:439:4613 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d4545000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:440:4615 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:440 state:D stack:0 pid:4615 tgid:4615 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb125d84 r8:00000002 r7:60000013 r6:eb125d8c r5:8514a400
r4:8514a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8514a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a63a40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8514a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaead000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d078c r4:852d0400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d078c r4:84b55b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8514a400 r8:84b55b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55b00 r8:8027ed34 r7:eb119e60 r6:84790e80 r5:8514a400
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d20: d46a0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
r4:84b73ac0
task:kworker/1:441 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb12dd84 r8:00000002 r7:60000113 r6:eb12dd8c r5:85149800
r4:85149800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85149800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121540
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85149800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0c3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d178c r4:852d1400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d178c r4:84b55c00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85149800 r8:84b55c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55c00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55c00 r8:8027ed34 r7:eb119e60 r6:84790f00 r5:85149800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb12dfb0 to 0xeb12dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85121080
INFO: task kworker/1:441:4617 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d499e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:442:4619 blocked for more than 475 seconds.
r4:8514b000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r5:852d0f8c r4:852d0c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d0f8c r4:84b55d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8514b000 r8:84b55dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55d80 r8:8027ed34 r7:eb12de60 r6:84790f80 r5:8514b000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb135fb0 to 0xeb135ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851211c0
INFO: task kworker/1:442:4619 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d4c31000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:8514bc00
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8514bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb051000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d138c r4:852d1000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d138c r4:84b55c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8514bc00 r8:84b55cac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55c80 r8:8027ed34 r7:eb12de60 r6:85077f80 r5:8514bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb13dfb0 to 0xeb13dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85121140
INFO: task kworker/1:443:4621 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d4e9f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
r5:84acb38c r4:84acb000
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:310:4624 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:310 state:D stack:0 pid:4624 tgid:4624 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb139d84 r8:00000002 r7:60000113 r6:eb139d8c r5:8514d400
r4:8514d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8514d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9400
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8514d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e47c3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:85167b8c r4:85167800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:85167b8c r4:850fb100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8514d400 r8:850fb12c r7:82804d40 r6:dddced40 r5:dddced60
r4:850fb100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850fb100 r8:8027ed34 r7:eb03de60 r6:850fb080 r5:8514d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb139fb0 to 0xeb139ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85126e80
INFO: task kworker/0:310:4624 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:444:4626 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:444 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:8514e000
r4:8514e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8514e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121600
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8514e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0ed000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d1b8c r4:852d1800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:84b55d00
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
1d20: d5301000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:82abe1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
r5:84acb38c r4:84acb000
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:445:4627 blocked for more than 475 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:445 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb149d84 r8:00000002 r7:60000013 r6:eb149d8c r5:8514ec00
r4:8514ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8514ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:84b55f00 r8:8027ed34 r7:eb145e60 r6:850fb180 r5:8514ec00
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r5:00001000 r4:dfcaf000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:446 state:D stack:0 pid:4629 tgid:4629 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:8514c800
r4:8514c800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8514c800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851218c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8514c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb151000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d238c r4:852d2000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d238c r4:84b55e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8514c800 r8:84b55eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b55e80 r8:8027ed34 r7:eb149e60 r6:850fb200 r5:8514c800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb155fb0 to 0xeb155ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85121640
INFO: task kworker/1:446:4629 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d54af000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
r4:84b73ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:447 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:85142400
r4:85142400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85142400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85142400 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9f1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d278c r4:852d2400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d278c r4:84b55f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85142400 r8:84b55fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b55f80
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 800d0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:84acb38c r4:84acb000
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:448 state:D stack:0 pid:4633 tgid:4633 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121b40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85150000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb17000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d2b8c r4:852d2800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d2b8c r4:8506d100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85150000 r8:8506d12c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d100 r8:8027ed34 r7:eb15de60 r6:850fb300 r5:85150000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb161fb0 to 0xeb161ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851216c0
INFO: task kworker/1:448:4633 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d71b0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:449 state:D stack:0 pid:4635 tgid:4635 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121cc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85150c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e03b2000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d2f8c r4:852d2c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d2f8c r4:8506d000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85150c00 r8:8506d02c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d000 r8:8027ed34 r7:eb161e60 r6:850fb380 r5:85150c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb165fb0 to 0xeb165ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85121a80
INFO: task kworker/1:449:4635 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d7704000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:84acb38c r4:84acb000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdff61fb0 to 0xdff61ff8)
r4:84b73ac0
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121dc0
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0419000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d338c r4:852d3000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d338c r4:8506d180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85152400 r8:8506d1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d180 r8:8027ed34 r7:eb165e60 r6:850fb400 r5:85152400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb169fb0 to 0xeb169ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:851219c0
INFO: task kworker/1:450:4639 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d79b0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:00000000
r5:00001000 r4:dfcaf000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xdff61fb0 to 0xdff61ff8)
r4:84b73ac0
Workqueue: events bpf_prog_free_deferred
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85121d00
INFO: task kworker/1:451:4641 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d7be0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
r4:85151800
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719cc0
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d3b8c r4:852d3800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d3b8c r4:8506d280
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85151800 r8:8506d2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d280
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d280 r8:8027ed34 r7:eb171e60 r6:850fb480 r5:85151800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb175fb0 to 0xeb175ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85121e80
INFO: task kworker/1:452:4642 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d7e82000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r4:00000001
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:311:4645 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:311 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb095d84 r8:00000002 r7:60000113 r6:eb095d8c r5:85154800
r4:85154800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85154800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb095e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9e40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85154800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea96f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:847d3b8c r4:847d3800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:847d3b8c r4:850fb580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85154800 r8:850fb5ac r7:82804d40 r6:dddced40 r5:dddced60
r4:850fb580
r10:00000000 r9:850fb580 r8:8027ed34 r7:eb03de60 r6:850fb680 r5:85154800
r4:850f9340
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d8087000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:453:4647 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:453 state:D stack:0 pid:4647 tgid:4647 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb179d84 r8:00000002 r7:60000113 r6:eb179d8c r5:85155400
r4:85155400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85155400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:e881d000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
1d60: 800d0013 ffffffff
r4:dff61dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:454:4649 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:454 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:85153000
r4:85153000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85153000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c080
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85153000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea891000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d3f8c r4:852d3c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d3f8c r4:8506d080
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85153000 r8:8506d0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
INFO: task kworker/1:454:4649 is blocked on a mutex likely owned by task kworker/1:79:3493.
Exception stack(0xdff61d20 to 0xdff61d68)
1d60: 800d0013 ffffffff
r4:dff61dc0
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:455:4651 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:455 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:85156000
r4:85156000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85156000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c280
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85156000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8c5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d438c r4:852d4000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d438c r4:8506d380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85156000 r8:8506d3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d380 r8:8027ed34 r7:eb185e60 r6:850fb700 r5:85156000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb189fb0 to 0xeb189ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8506c040
INFO: task kworker/1:455:4651 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d8ac5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r4:84950000
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84950000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea8f7000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d478c r4:852d4400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d478c r4:8506d400
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84950000 r8:8506d42c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d400
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d400 r8:8027ed34 r7:eb189e60 r6:850fb800 r5:84950000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb18dfb0 to 0xeb18dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8506c040
INFO: task kworker/1:456:4652 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d9245000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:82abe1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:457:4655 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:457 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb195d84 r8:00000002 r7:60000013 r6:eb195d8c r5:84951800
r4:84951800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84951800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c840
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84951800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa77000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d538c r4:852d5000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d538c r4:8506d580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84951800 r8:8506d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d580 r8:8027ed34 r7:eb18de60 r6:850fb880 r5:84951800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb195fb0 to 0xeb195ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8506c300
INFO: task kworker/1:457:4655 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d9245000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r4:dff61dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:458:4656 blocked for more than 476 seconds.
Call trace:
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c580
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: d9245000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:312:4659 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:312 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb181d84 r8:00000002 r7:60000113 r6:eb181d8c r5:84953000
r4:84953000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84953000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:84953000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadd9000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b078c r4:852b0400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b078c r4:850fb980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84953000 r8:850fb9ac r7:82804d40 r6:dddced40 r5:dddced60
r4:850fb980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:850fb980 r8:8027ed34 r7:eb03de60 r6:850fba80 r5:84953000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb181fb0 to 0xeb181ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:850f9d80
INFO: task kworker/0:312:4659 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
1d20: da197000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:459:4660 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
Call trace:
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c740
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84953c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa59000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d4f8c r4:852d4c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d4f8c r4:8506d500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84953c00 r8:8506d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d500 r8:8027ed34 r7:eb195e60 r6:850fba00 r5:84953c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb19dfb0 to 0xeb19dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8506c300
INFO: task kworker/1:459:4660 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: da197000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:460:4663 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:460 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb1a1d84 r8:00000002 r7:60000013 r6:eb1a1d8c r5:84954800
r4:84954800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84954800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506ca80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84954800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaafb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d5b8c r4:852d5800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:8506d680
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8506c780
INFO: task kworker/1:460:4663 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: da7b7000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:461:4665 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:461 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb1a9d84 r8:00000002 r7:60000013 r6:eb1a9d8c r5:84956000
r4:84956000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84956000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c980
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84956000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa8f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d578c r4:852d5400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d578c r4:8506d600
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84956000 r8:8506d62c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d600
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d600 r8:8027ed34 r7:eb1a1e60 r6:850fbb80 r5:84956000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a9fb0 to 0xeb1a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8506c8c0
INFO: task kworker/1:461:4665 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: dab2a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r5:84acb38c r4:84acb000
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r5:84955400 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b1e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852559c0
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead81000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b038c r4:852b0000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852b038c r4:8506d700
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84955400 r8:8506d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d700
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d700 r8:8027ed34 r7:eb1a1e60 r6:850fbc00 r5:84955400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1b1fb0 to 0xeb1b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8506c9c0
INFO: task kworker/1:462:4667 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: daf08000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:463:4668 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:463 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:84950c00
r4:84950c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84950c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506cc00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84950c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab1f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d5f8c r4:852d5c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d5f8c r4:8506d780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84950c00 r8:8506d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d780 r8:8027ed34 r7:eb1b1e60 r6:850fbc80 r5:84950c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1b5fb0 to 0xeb1b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8506c9c0
INFO: task kworker/1:463:4668 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: db2d5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:464:4670 blocked for more than 476 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:464 state:D stack:0 pid:4670 tgid:4670 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb1bdd84 r8:00000002 r7:60000113 r6:eb1bdd8c r5:85308c00
r4:85308c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85308c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506cd40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85308c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab43000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d638c r4:852d6000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d638c r4:8506d880
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85308c00 r8:8506d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d880
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d880 r8:8027ed34 r7:eb1b1e60 r6:850fbd00 r5:85308c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1bdfb0 to 0xeb1bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8506cb40
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 800d0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
task:kworker/1:465 state:D stack:0 pid:4672 tgid:4672 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:85308000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506ce40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85308000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab61000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d678c r4:852d6400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d678c r4:8506d900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85308000 r8:8506d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506d900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506d900 r8:8027ed34 r7:eb1b1e60 r6:850fbd80 r5:85308000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c5fb0 to 0xeb1c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8506ce80
INFO: task kworker/1:465:4672 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: dbaef000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:dff61dc0
r4:00000000
r5:00001000 r4:dfcaf000
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:466:4675 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:466 state:D stack:0 pid:4675 tgid:4675 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb1d1d84 r8:00000002 r7:60000013 r6:eb1d1d8c r5:85309800
r4:85309800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85309800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506cfc0
r5:00001000 r4:eab8d000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Call trace:
1d20: dbe67000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r4:dff61dc0
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:467:4676 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:467 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb1d5d84 r8:00000002 r7:60000113 r6:eb1d5d8c r5:8530bc00
r4:8530bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8530bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9680
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8530bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
r5:00001000 r4:ead4f000
r10:61c88647 r9:8530bc00 r8:8506da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:850f9800
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: dbe67000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:468:4678 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:468 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r4:dff61dc0
r5:00001000 r4:dfcaf000
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
r7:ddde2d40 r6:83018200 r5:852d7f8c r4:8506db00
INFO: task kworker/1:469:4681 is blocked on a mutex likely owned by task kworker/1:79:3493.
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e5e08
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:853050c0
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:313:4685 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:313 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8530ec00
r4:8530ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8530ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
1fa0: 00000000 00000000 00000000 00000000
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
Exception stack(0xdff61fb0 to 0xdff61ff8)
Workqueue: events bpf_prog_free_deferred
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
9fa0: 00000000 00000000 00000000 00000000
r4:00000000
r4:82abe1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:472:4689 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:472 state:D stack:0 pid:4689 tgid:4689 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb1f5d84 r8:00000002 r7:60000013 r6:eb1f5d8c r5:84470000
r4:84470000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84470000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305600
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84470000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf6b000
r7:ddde2d40 r6:83018200 r5:852d838c r4:8506dc80
r4:85305340
INFO: task kworker/1:472:4689 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: dd846000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:473:4690 blocked for more than 477 seconds.
r5:84470c00 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r7:ddde2d40 r6:83018200 r5:852d9b8c r4:8506dd00
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: ddd1a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
r4:84b73ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85346cc0
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:85340380 r8:8027ed34 r7:eb191e60 r6:85340480 r5:84473000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85255280
INFO: task kworker/0:314:4693 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: de07f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:84acb38c r4:84acb000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdff61fb0 to 0xdff61ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r5:00001000 r4:eaf75000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d878c r4:852d8400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d878c r4:8506db80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84473c00 r8:8506dbac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506db80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506db80 r8:8027ed34 r7:eb1f9e60 r6:85340400 r5:84473c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb205fb0 to 0xeb205ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85305540
INFO: task kworker/1:474:4694 is blocked on a mutex likely owned by task kworker/1:79:3493.
task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d20: de532000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
Exception stack(0xdff61fb0 to 0xdff61ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r4:84472400
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:00000000 r9:8506de00 r8:8027ed34 r7:eb1f9e60 r6:85340500 r5:84472400
Workqueue: events bpf_prog_free_deferred
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:476:4698 blocked for more than 477 seconds.
r4:84471800
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r7:ddde2d40 r6:83018200 r5:852d8f8c r4:8506de80
r4:853057c0
r4:00000000
r4:82abe1e4
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:477 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb061d84 r8:00000002 r7:60000113 r6:eb061d8c r5:84474800
r4:84474800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84474800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305900
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84474800 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa07000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d938c r4:852d9000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d938c r4:8506dd80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84474800 r8:8506ddac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506dd80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506dd80 r8:8027ed34 r7:eb1f9e60 r6:85340600 r5:84474800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb061fb0 to 0xeb061ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85305900
INFO: task kworker/1:477:4700 is blocked on a mutex likely owned by task kworker/1:79:3493.
1d60: 800d0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdff61fb0 to 0xdff61ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r5:84475400 r4:829185c0
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305c40
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84475400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc87000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852d978c r4:852d9400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852d978c r4:8506df00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84475400 r8:8506df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:8506df00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8506df00 r8:8027ed34 r7:eb1f9e60 r6:85340680 r5:84475400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb221fb0 to 0xeb221ff8)
1fa0: 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:00000000
r4:82abe1e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcaf000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb38c r4:84acb000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f800
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff61fb0 to 0xdff61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:479:4704 blocked for more than 477 seconds.
Workqueue: events bpf_prog_free_deferred
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84476000 r8:8506dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85305c00
r4:00000000
Exception stack(0xdff61d20 to 0xdff61d68)
1d20: df996000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0
1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0
1d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08
r4:dff61dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00
r4:00000000
[<dff61e74>] (0xdff61e74) from [<dff61ea4>] (0xdff61ea4)
Backtrace aborted due to bad frame pointer <847b5380>
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:480:4706 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:480 state:D stack:0 pid:4706 tgid:4706 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb231d84 r8:00000002 r7:60000113 r6:eb231d8c r5:84476c00
r4:84476c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84476c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r10:00000000 r9:85349100 r8:8027ed34 r7:eb229e60 r6:85340780 r5:84476c00
r4:85305a80
Call trace:
9d20: 7f8be000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:481:4708 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:481 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb239d84 r8:00000002 r7:60000013 r6:eb239d8c r5:85320000
r4:85320000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85320000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853050c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85320000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0493000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852da38c r4:852da000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852da38c r4:85349000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85320000 r8:8534902c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349000 r8:8027ed34 r7:eb229e60 r6:85340800 r5:85320000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb239fb0 to 0xeb239ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85305e00
INFO: task kworker/1:481:4708 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 7f8be000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 900d0013 ffffffff
r5:900d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
r4:84b73900
task:kworker/1:482 state:D stack:0 pid:4710 tgid:4710 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb241e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255d80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85321800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0535000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852da78c r4:852da400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852da78c r4:85349180
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85321800 r8:853491ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349180
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349180 r8:8027ed34 r7:eb229e60 r6:85340880 r5:85321800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb241fb0 to 0xeb241ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeb1d9fb0 to 0xeb1d9ff8)
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:315:4716 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:315 state:D stack:0 pid:4716 tgid:4716 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb23dd84 r8:00000002 r7:60000113 r6:eb23dd8c r5:85323000
r4:85323000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85323000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b178c r4:852b1400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b178c r4:85340a00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85323000 r8:85340a2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85340a00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85340a00 r8:8027ed34 r7:eb191e60 r6:85340980 r5:85323000
r4:00000001
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff59d20 to 0xdff59d68)
r4:dff59dc0
r4:00000000
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
9fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb245e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84786040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85324800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead21000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b1b8c r4:852b1800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b1b8c r4:85340a80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85324800 r8:85340aac r7:82804d40 r6:dddced40 r5:dddced60
r4:85340a80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85340a80 r8:8027ed34 r7:eb191e60 r6:85340b00 r5:85324800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
Exception stack(0xdff59d20 to 0xdff59d68)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:84b6f780
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:484:4719 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:484 state:D stack:0 pid:4719 tgid:4719 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:85325400
r4:85325400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85325400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
r4:00000000
r5:852daf8c r4:852dac00
r4:85349280
9fa0: 00000000 00000000 00000000 00000000
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:485:4722 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:485 state:D stack:0 pid:4722 tgid:4722 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb255d84 r8:00000002 r7:60000013 r6:eb255d8c r5:85326000
r4:85326000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85326000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08
r4:00000000
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:852db78c r4:852db400
r10:61c88647 r9:85326000 r8:8534932c r7:82804d40 r6:ddde2d40 r5:ddde2d60
5fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 80b6f000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:486:4724 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:829185c4 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:8526bc00
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r5:00001000 r4:eacc3000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
Exception stack(0xeb099fb0 to 0xeb099ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:487:4725 blocked for more than 477 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:487 state:D stack:0 pid:4725 tgid:4725 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb24dd84 r8:00000002 r7:60000013 r6:eb24dd8c r5:8526ec00
r4:8526ec00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8526ec00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352680
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8526ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852dbb8c r4:852db800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852dbb8c r4:85349380
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8526ec00 r8:853493ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349380
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349380 r8:8027ed34 r7:eb099e60 r6:85349480 r5:8526ec00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb24dfb0 to 0xeb24dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85352480
INFO: task kworker/1:487:4725 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 80f67000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
Exception stack(0xdff59fb0 to 0xdff59ff8)
r4:84b73900
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:488 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb259d84 r8:00000002 r7:60000113 r6:eb259d8c r5:8526e000
r4:8526e000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8526e000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352a00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8526e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacd3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852dc38c r4:852dc000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852dc38c r4:85349500
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8526e000 r8:8534952c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349500
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349500 r8:8027ed34 r7:eb099e60 r6:85349600 r5:8526e000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb259fb0 to 0xeb259ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:853525c0
INFO: task kworker/1:488:4728 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 8167e000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:8526d400 r4:829185c0
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352ac0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8526d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacff000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852dc78c r4:852dc400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852dc78c r4:85349680
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8526d400 r8:853496ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349680
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349680 r8:8027ed34 r7:eb259e60 r6:85349700 r5:8526d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fa0: 00000000 00000000 00000000 00000000
r4:85352940
Workqueue: events bpf_prog_free_deferred
r4:00000000
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
r4:dff59dc0
r4:00000000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
9fa0: 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:490:4732 blocked for more than 478 seconds.
task:kworker/1:490 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:85268c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853565c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85268c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb003000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852dd38c r4:852dd000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852dd38c r4:85349580
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85268c00 r8:853495ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349580
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349580 r8:8027ed34 r7:eb261e60 r6:85349780 r5:85268c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb25dfb0 to 0xeb25dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85352a40
INFO: task kworker/1:490:4732 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 81b23000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:317:4735 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:317 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb271d84 r8:00000002 r7:60000113 r6:eb271d8c r5:8526b000
r4:8526b000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8526b000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84786440
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:8526b000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaea5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:847d078c r4:847d0400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:847d078c r4:85340c80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8526b000 r8:85340cac r7:82804d40 r6:dddced40 r5:dddced60
r4:85340c80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85340c80 r8:8027ed34 r7:eb191e60 r6:85349800 r5:8526b000
1fa0: 00000000 00000000 00000000 00000000
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 81f34000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:318:4736 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:318 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb275d84 r8:00000002 r7:60000113 r6:eb275d8c r5:8526a400
r4:8526a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8526a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c140
r5:00001000 r4:eae85000
r7:dddced40 r6:83018000 r5:852dcb8c r4:85340d00
r10:00000000 r9:85340d00 r8:8027ed34 r7:eb271e60 r6:85349880 r5:8526a400
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:319:4737 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:319 state:D stack:0 pid:4737 tgid:4737 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb27dd84 r8:00000002 r7:60000113 r6:eb27dd8c r5:85156c00
r4:85156c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85156c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c300
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85156c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b238c r4:852b2000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b238c r4:85340d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85156c00 r8:85340dac r7:82804d40 r6:dddced40 r5:dddced60
r4:85340d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85340d80 r8:8027ed34 r7:eb271e60 r6:85349a00 r5:85156c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb27dfb0 to 0xeb27dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8535c080
INFO: task kworker/0:319:4737 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 82834000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84b6f780
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:320:4739 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:320 state:D stack:0 pid:4739 tgid:4739 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb285d84 r8:00000002 r7:60000113 r6:eb285d8c r5:851a4800
r4:851a4800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:851a4800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c440
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:851a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaeab000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b278c r4:852b2400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b278c r4:85340e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:851a4800 r8:85340e2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85340e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85340e00 r8:8027ed34 r7:eb271e60 r6:85349a80 r5:851a4800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb285fb0 to 0xeb285ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8535c240
INFO: task kworker/0:320:4739 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 82b75000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:491:4741 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:491 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb289d84 r8:00000002 r7:60000113 r6:eb289d8c r5:85269800
r4:85269800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85269800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb289e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356500
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85269800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eafa5000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852dcf8c r4:852dcc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852dcf8c r4:85349b00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85269800 r8:85349b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349b00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349b00 r8:8027ed34 r7:eb25de60 r6:85349b80 r5:85269800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb289fb0 to 0xeb289ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85255e80
INFO: task kworker/1:491:4741 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 8320a000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
r5:00001000 r4:dfccb000
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:321:4743 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:321 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb291d84 r8:00000002 r7:60000113 r6:eb291d8c r5:85278c00
r4:85278c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85278c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb291e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c5c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85278c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaefd000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b2b8c r4:852b2800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b2b8c r4:85340f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85278c00 r8:85340f2c r7:82804d40 r6:dddced40 r5:dddced60
r4:85340f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85340f00 r8:8027ed34 r7:eb271e60 r6:85349c00 r5:85278c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb291fb0 to 0xeb291ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8535c380
INFO: task kworker/0:321:4743 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 83377000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:322:4744 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:322 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb299d84 r8:00000002 r7:60000113 r6:eb299d8c r5:85278000
r4:85278000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85278000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c700
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85278000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf15000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b2f8c r4:852b2c00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b2f8c r4:85340f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85278000 r8:85340fac r7:82804d40 r6:dddced40 r5:dddced60
r4:85340f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85340f80 r8:8027ed34 r7:eb271e60 r6:85349c80 r5:85278000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb299fb0 to 0xeb299ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8535c500
INFO: task kworker/0:322:4744 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 83845000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:323:4747 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:323 state:D stack:0 pid:4747 tgid:4747 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:85326c00
r4:85326c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85326c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85365080
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018005 r8:85326c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e886d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852b378c r4:852b3400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced40 r6:83018000 r5:852b378c r4:85340e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85326c00 r8:85340eac r7:82804d40 r6:dddced40 r5:dddced60
r4:85340e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85340e80 r8:8027ed34 r7:eb271e60 r6:850fbf80 r5:85326c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb265fb0 to 0xeb265ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:8535c640
INFO: task kworker/0:323:4747 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 83af0000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:492:4750 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:492 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb2a5d84 r8:00000002 r7:60000013 r6:eb2a5d8c r5:8530a400
r4:8530a400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8530a400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356700
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8530a400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb00f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852dd78c r4:852dd400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852dd78c r4:85349d00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8530a400 r8:85349d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349d00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349d00 r8:8027ed34 r7:eb25de60 r6:85077f00 r5:8530a400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2a5fb0 to 0xeb2a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:853564c0
INFO: task kworker/1:492:4750 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 83e23000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:493:4752 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:493 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb2a9d84 r8:00000002 r7:60000013 r6:eb2a9d8c r5:85320c00
r4:85320c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85320c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853568c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85320c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb021000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852ddb8c r4:852dd800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852ddb8c r4:85349d80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85320c00 r8:85349dac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349d80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349d80 r8:8027ed34 r7:eb2a5e60 r6:85355000 r5:85320c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2a9fb0 to 0xeb2a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85356640
INFO: task kworker/1:493:4752 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 83f4f000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:494:4754 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:494 state:D stack:0 pid:4754 tgid:4754 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:84956c00
r4:84956c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:84956c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356b00
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:84956c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb04b000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852de38c r4:852de000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852de38c r4:85349e80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:84956c00 r8:85349eac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349e80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349e80 r8:8027ed34 r7:eb2a9e60 r6:85355080 r5:84956c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2b1fb0 to 0xeb2b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85356800
INFO: task kworker/1:494:4754 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 84471000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:495:4755 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:495 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb2b5d84 r8:00000002 r7:60000113 r6:eb2b5d8c r5:85270000
r4:85270000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85270000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853569c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85270000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb02d000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852ddf8c r4:852ddc00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852ddf8c r4:85349f80
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85270000 r8:85349fac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349f80
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349f80 r8:8027ed34 r7:eb2b1e60 r6:85355100 r5:85270000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2b5fb0 to 0xeb2b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85356980
INFO: task kworker/1:495:4755 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 849b4000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:496:4757 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:496 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb2bdd84 r8:00000002 r7:60000013 r6:eb2bdd8c r5:85271800
r4:85271800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85271800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356bc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85271800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb055000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852de78c r4:852de400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852de78c r4:85349f00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85271800 r8:85349f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349f00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349f00 r8:8027ed34 r7:eb2b1e60 r6:85355180 r5:85271800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2bdfb0 to 0xeb2bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85356300
INFO: task kworker/1:496:4757 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 84c6c000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:497:4759 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:497 state:D stack:0 pid:4759 tgid:4759 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:85270c00
r4:85270c00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85270c00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356b80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85270c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0b1000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852df38c r4:852df000
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852df38c r4:85349e00
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85270c00 r8:85349e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349e00
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349e00 r8:8027ed34 r7:eb2bde60 r6:85355200 r5:85270c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2c5fb0 to 0xeb2c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85356c40
INFO: task kworker/1:497:4759 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 852bd000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:498:4761 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:498 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb2c9d84 r8:00000002 r7:60000113 r6:eb2c9d8c r5:85273000
r4:85273000
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85273000 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356dc0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85273000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb073000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852deb8c r4:852de800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852deb8c r4:85349900
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85273000 r8:8534992c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349900
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349900 r8:8027ed34 r7:eb2c5e60 r6:85355280 r5:85273000
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2c9fb0 to 0xeb2c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85356300
INFO: task kworker/1:498:4761 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 85602000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:499:4763 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:499 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb2d1d84 r8:00000002 r7:60000013 r6:eb2d1d8c r5:85274800
r4:85274800
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:85274800 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356ec0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:85274800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0a3000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852def8c r4:852dec00
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852def8c r4:85349980
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:85274800 r8:853499ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85349980
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85349980 r8:8027ed34 r7:eb2c5e60 r6:85355300 r5:85274800
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2d1fb0 to 0xeb2d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85356d00
INFO: task kworker/1:499:4763 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 85919000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:500:4765 blocked for more than 478 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:500 state:D stack:0 pid:4765 tgid:4765 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:8527bc00
r4:8527bc00
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8527bc00 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535d040
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8527bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa1f000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852df78c r4:852df400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852df78c r4:85354100
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8527bc00 r8:8535412c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85354100
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85354100 r8:8027ed34 r7:eb2c5e60 r6:85354080 r5:8527bc00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2c1fb0 to 0xeb2c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85356e00
INFO: task kworker/1:500:4765 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 85c11000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:84b73900
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:501:4767 blocked for more than 479 seconds.
Not tainted 6.16.0-rc1-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:501 state:D stack:0 pid:4767 tgid:4767 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline])
[<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878)
r10:829185c4 r9:eb2d5d84 r8:00000002 r7:60000113 r6:eb2d5d8c r5:8527d400
r4:8527d400
[<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935)
r5:8527d400 r4:829185c0
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline])
[<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)
[<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035)
r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08
r4:00000000
[<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278)
[<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535d1c0
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:8527d400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb47000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:852dfb8c r4:852df800
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:852dfb8c r4:85354000
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:8527d400 r8:8535402c r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:85354000
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85354000 r8:8027ed34 r7:eb2c1e60 r6:85354180 r5:8527d400
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2d5fb0 to 0xeb2d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30
r4:85356f40
INFO: task kworker/1:501:4767 is blocked on a mutex likely owned by task kworker/1:78:3491.
task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108)
r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00
r4:00000000
[<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdff59d20 to 0xdff59d68)
9d20: 860d8000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0
9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0
9d60: 800d0013 ffffffff
r5:800d0013 r4:80239bd0
[<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328)
r4:82abe1e4
[<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08
r4:dff59dc0
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline])
[<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80
r4:00000000
[<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433)
r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfccb000
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)
r5:84acb78c r4:84acb400
[<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780
[<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline])
[<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402)
r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60
r4:84b6f780
[<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00
r4:00000001
[<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdff59fb0 to 0xdff59ff8)
9fa0: 00000000 00000000 00000000 00000000